SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 670
Image Steganography using Pixel Pattern Matching in Cloud Data
Storage
K. Usha Nandhini1, K. Swarna2, M.Preetha3, W. Mercy4
1UG Student, Department of CSE, Agni College of Technology, Tamil Nadu, India
4Sr. Assistant Professor, Dept of Computer Science and Engineering, Agni College of Technology,
Tamil Nadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - With the event of cloud computing, Information
security becomes additional and vitalincloudcomputing. This
paper analyses the fundamental downside of cloudcomputing
information security. Since CloudComputingsharedistributed
resources via network withintheopensurroundings, therefore
it makes security issues. During this technique, we have a
tendency to use Grid choices and Pass Point algorithms. This
formula method on the image to urge the component points
and therefore the points were used as a secret key for the file
uploaded by the user. These techniques were totally different
from the standard technique. So here we focus on
authentication problem. User authentication is one of the
important and fundamental components in most computer
security systems. Biometrics is one of the important
authentication methods used to tackle the problems
associated with traditional username – passwords. But here
we will deal with another alternative: using image as
password. A graphical password is an authentication system
works by having the user interface (GUI).
Key Words: Graphical password, security, protection, CaRP.
1. INTRODUCTION
Computer security (Also called cyber securityorITsecurity)
is data security as applied to computers and networks. The
sphere covers all the processors and mechanisms by that
computer- based instrumentality, data and services square
measure protectedagainstunwittingorunauthorizedaccess,
modification or destruction. Laptop security additionally
includes protection from unplanned events and natural
accidents , fig. 1.
Most laptop security measures involve encoding and
passwords. Encoding is that the translation of knowledge
into a type that’s unintelligible while not a deciphering
mechanism. A parole may be a secret word or phrase that
offers a user to access a selected program or system.
Fig -1: Justify the concerning the secure computing
2. BASIC NEEDS IN THE SECURE COMPUTING
If you don’t take basic steps to protect your computer, you
put it and all the information on it at risk. Youcanpotentially
compromise the operation of the computers on your
organizations network, or even the functioning of the
network as a whole.
2.1 Physical security:
Technical measures like login passwords, anti-virus is
essential. (More about those below) However, a secure
physical space is the first and more important line of
defense.
Is the place you keep your workplace computer secure
enough to prevent theft or access to it while you are away?
While the security Department provides coverage the
Medical center, it only takes seconds to steal a computer,
particularly a portable device like a laptop or a PDA. A
computer should be secured like any other valuable
possession when you are not present.
Human threats are not the only concern. Computers can be
compromised by environment mishaps (e.g., water, coffee)
or physical trauma. Make sure the physical location of your
computer takes of those risks as well.
2.2 Access passwords:
The University’s network and shared information systems
are protected in part by login credentials (user-IDs and
passwords). Access password is an essential protection for
personal computers in ourcircumstances.Officesareusually
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 671
open and shared spaces, so physical access to computers
cannot be completely controlled.
2.3 Prying eye protection:
We all deal with all facts of clinical research, educational and
administrative data here on the medical campus. This is
important to do everything possibletominimizeexposure of
data to unauthorized individuals.
2.4 Anti-virus software:
Enlightened, properly configured anti-virus software is
essential. We have server-side anti-virus software on our
network computers, you still need it on the client side (your
computer).
2.5 Firewalls:
Anti-virus products inspect files on your computers and in
email. Firewall software and hardware monitor
communication between your computer and the outside
world. That is essential for any networked computer.
2.6 Software updates:
It is critical to keep software up to date, specially the
operating system, anti-virus and anti-spyware, email and
browser software. The newest versions will containfixes for
discovered vulnerability.
Mass of anti-virus have automatic updatefeatures(including
SAV). Keeping the “SIGNATURES” (digital patterns) of
malicious software detectors enlightened is essential for
these products to be effective.
2.7 Keep secure backups:
Even if you take all these security tread, bad things can still
happen. Always be prepared fortheworstbymaking backup
copies of critical data, and keeping those backup copies in a
separate, secure location. For example, use supplemental
hard drives, CDs/DVDs, or flash drives to storecritical,hard-
to-replace data.
2.8 Report problems:
If you believe that your computer or any data on it has been
compromised, you should make a information security
incident report. It is required by Universitypolicyforall data
on our systems, and legitimately required for health,
education, financial and any other kind of record containing
identifiable personal information.
3. BENEFITS OF SECURE COMPUTING
3.1 Protect yourself – Civil liability:
You may be held amenable to compensate a third party
should they experience financial damage or distress as a
result of their personal data being stolen from you or leaked
by you.
3.2 Protect your credibility - Compliance:
You may require compliancy with the Data Protection Act,
the FSA, SOX or other regulatory quality. Each of these
bodies demand that certain measuresbetakentoprotect the
data on your network.
3.3 Protect your reputation – Spam:
A common usage for infected systems is to join them to a
botnet (a collection of infected machines which takesorders
from a command server) and use them to send out spam.
This spam can be traced back to you, your server will be
blacklisted and you will be unable to send email.
3.4 Protect your income – Competitive advantages:
There are a number of “hackers-for-hire” advertising their
services on the internet selling their skills in breaking into
company’s servers to steal client database, proprietary
software, merger and acquisition information, personal
detail set.
3.5 Protect your business – Blackmail:
A seldom-reported sourceof incomefor“hackers”istobreak
into your server, change all your passwords and secure you
out of it. The password is then sold back to you. Note: the
“hackers” may implant a backdoor program on your server
so that can repeat the exercise at will.
3.6 Protect your investment – Free storage:
Your server’s hard drive space is used to house the hacker’s
video clips, music collections, pirated software or worse.
Your server or computer then becomes continuously slow
and your internet connection speeds deteriorate due to the
number of people connecting to your server in order to
download the offered wares.
4. RELATED WORK
In this section we have studied few papers which shows
about the graphical passwords for security
1. P.C Van Oorschot and J. Thorpe proposed “On
predictive models and user drawn graphical
passwords” which results quantitatively support
suggestions that user-drawn graphical password
systems employ measures, such as graphical
password rules or guideline and proactive
password checking.
2. A. E. Dirik, N. Memon and J.-C. Birget proposed “
Modeling user choice in the Pass Point graphical
password scheme ” which results that the model
and experiments are small and limited, but they
show that user choice can be modeled and that
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 672
expansions of the model and the experiments are
promising direction of research.
3. B.Pinkas and T. Sandar proposed “Secure
passwords against dictionary attacks” it is easy to
implement and overcome some of the difficulties of
previously suggested methods of improving the
security of user authentication scheme and it
provides better protection against denial of service
attacks against user accounts.
4. M. Alsaleh, M. Mannan , and P . C. Van Oorschot
proposed “Revisiting defenses against large-scale
online password guessing attacks” it analyze the
performance of PGRP with two real-world data sets
and find it more promising than existing proposals.
5. SYSTEM ANALYSIS
5.1 Existing System:
The security of the theme continues to be secure if the
outflow of the key secret is up to bound bits such the
information of those bits doesn’t facilitate to recover the
total secret key. However, although victimization outflow
resilient primitive will safeguard the outflow of bound bits,
there exists another sensible limitation. Suppose we tend to
place a part of the key into protection device. The user has
to acquire a replacement so he will still decipher his
corresponding secret key. This approach are often simply
achieved. Still, there exists security risk. If the register may
also force to lock the personal computer wherever a part of
secret is keep, then it will decipher all cipher text
comparable to the victim user. The foremost secure
approach is to stop the validity of the taken security.
5.2 Disadvantages of Existing System:
1. If the user has lost his secret key, then his / her
corresponding cipher text within the cloud can not
be decrypted forever that’s, the approach cannot
support secret key update / revocability.
2. Processing step are high.
3. Knowledge loss will occur.
4. Computation price is high.
5.3 Proposed System:
In this paper, we present a new security primitive based on
AI problems, namely, a NOVEL family of graphical password,
which called as Graphical passwords. It addresses a number
of security problems, such as online guessing attacks, relay
attacks, and if combined with dual-view technologies,
shoulder-surfing attacks. The proposed system model is
given fig. 2.
5.4 Advantages of Proposed System:
1. Graphical watch word offers protection against
online wordbook attacks on passwords, that arefor
very long time a significant security threat for
varied online services.
2. It additionally offers protection against relay threat
to bypass encoding protection.
Fig -2: Proposed System Model
6. ALGORITHM
In 2005, Pass Point created in order tocoverthelimitationof
BLONDER ALGORITHM which was limitation of image. The
picture wil be any natural picture or painting butatthesame
time should be rich enough in order to have many possible
click points. On the contrary, the image is not secret and has
no role other than helping the user to remember the click
point. Another source of flexibility is thatthereisno needfor
artificial predefined click region with well-marked
boundaries like BLONDER ALGORITHM.
The user is choosing several points on the picture in a
particular order. In order to login, the user has to click close
to the chosen click point, within some (adjustable)tolerance
distance, for example within 0.25cm from actual click point.
As in BLONDER ALGORITHM, user had to click on the
predefined image at predefined region. Passpoint over
comes this by selecting any natural image and having as a
many click points as possible which make the system more
secure.
Passpoint system has the potential for extremely high
entropy. As any pixel in the image is the candidate for a click
point so there are hundreds of possible memorablepointsin
the challenge image. There are numberofresearchingon the
characteristics of this model like predicting probabilities of
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 673
likely click point which enables the predictingtheentropy of
the click point in a graphical password for a given image.
7. MODULES
7.1 User Registration:
In this module, users are having authentication and security
to access the cloud. For security, captcha technique is
implemented to access the detail which is presented in the
image system. Each time users have to enter, registered
captcha text and password for accessing the account. The
registered data can be stored in a table fig. 3.
Fig -3: Register Data in Table Form
7.2 File Synchronization And Security:
The user can set up the server after system is opened. Then
the user can upload the file to the storage with the key to
a0ccess it. The key process is done with grid selection and
Pass Point algorithm. By clickingparticularpointatthegiven
image, the position of the image pixel is taken as X & Y Co-
ordinates as key. These co-ordinates were assigns as X1, Y1
and by clicking on different position 2nd coordinates were
assigned as X2, Y2,which is referred in fig.4. In this a
password guess tested in an unsuccessful trial isdetermined
than traditional approaches.
Fig -3: Key Generation for Authorized Users
7.3 User File Request:
The request process is done via protocol and key is send to
an authorized user through mail. By this process key is
shared and the file is viewed/downloaded by the other user
with the key given by the data owner.
7.4 Key Generation And Downloading:
The number of undetermined positiveidentificationguesses
decreases with a lot of trials, resulting in an improved
likelihood of finding the positive identification. To counter
shot attacks, ancient approaches in planning graphical
positive identifications aim at increasing the effective
password area to formpasswordsmoredurabletoguessand
therefore need a lot of trials, the positive identification will
invariably be found by a brute force attack. In this paper, we
tend to distinguish key generated through which concept
than the normal approaches, and key request method is
finished through the protocol with the opposite user to
access files.
8. CONCLUSION
We have projected CaRP, a replacement security primitive
hoping on unsolved onerous AI issues. CaRP is the
combination of a Captcha and a graphical secret theme. The
notion of CaRP introduces a replacement family of graphical
passwords. Like Captcha CaRp utilizes unsolved AI issues.
However a watchword is way a lot of valuable to attackers
than a free email account that captcha is usually won’t to
defend. Thus there square measure a lot of incentives for
attackers to hack CaRP than Captcha. That is, a lot of efforts
are going to be drawn to the subsequent win-win game by
CaRP than normal Captcha: If attackers succeed, they
contribute to up AI by providing solutionstoopenissueslike
segmenting second texts. Otherwise, our system stays
secure, conductive to sensible security. As a framework,
CaRP doesn’t think about any specific Captcha theme. Once
one Captcha theme is broken, a brand new and safer one
could seem and be regenerate to CaRP theme. Overall, our
work is one break through within the paradigm of
mistreatment exhausting AI issues or security. Of cheap
security and value and sensible applications,CaRPhassmart
potential for refinements, that concern helpful future work.
A lot of significantly, we have a tendency to expect CaRP to
inspire new inventions of such AI based mostly security
primitives.
9. REFERENCES:
[1] Mudassar Ali Khan, Ikram Ud Din, Sultan Ullah Jadoon,
Muhmmad Khurram Khan, Mohsen Guizani, KamranAhmad
Awan “g-RAT | A Novel Graphical Randomized
Authentication Technique for Consumer Smart Devices”,
2019, IEEE Transaction on Consumer Elctronics.
[2] (2012, Eeb) The Science Behind Passfaces [Online]
Available:
http://www.realuser.com/published/ScienceBehindPassfac
es.pdf
[3] I.Jermyn , A.Mayer, F.Monrose, M.Reiter and A.Rubin,
“The design and analysis of graphical passwords,” inProc. 8th
USENIX Security Symp, 1999, pp.1-5.
[4] H. Toa and C. Adams, “Pass-Go: A proposal toimprovethe
usability of graphical passwords” Int. J. Net Security, vol.7,
no.2, pp. 273-292, 2008.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 674
[5] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N.
Menon, “Pass Point: Design and longitudinal evaluation of
graphical password system” In. J. HCI, vol.102-127,Jul.2005.
[6] P. C. van Oorschot and J. Thrope, “On predictive models
and user drawn graphical passwords” ACM Trans. Inf. Syst.
Security, vol. 10, no. 4, pp. 1-33, 2008.
[7] K. Golofit, “Click passwords underinvestigation,”inproc.
ESORICS, 2007, pp. 343-358.
[8] A. E. Dirik, N. Memon and J.-C Birget, “Modeling user
choice in the passpoints graphical scheme” in proc. Symp.
Usable Privacy Security, 2007, pp. 20-28.
[9] J. Thorpe and P.C. van Oorschot “Human-seeded attacks
and exploiting hot spots in graphical passwords” in proc.
USENIX Security, 2007, pp. 103-118.
[10] P.C. van Oorschot, A. Salehi-Abari, and J.Thorpe “Purely
automated attacksonpassPoints-stylegraphical passwords”
IEEE Trans. Forensics Security, vol.5, no.3, pp. 393-405,
Sep.2010.

More Related Content

What's hot

3rd party information security assessment guideline
3rd party information security assessment guideline3rd party information security assessment guideline
3rd party information security assessment guideline
Priyanka Aash
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
IJMTST Journal
 
ITE - Chapter 10
ITE - Chapter 10ITE - Chapter 10
ITE - Chapter 10
Irsandi Hasan
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
IJECEIAES
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
IAEME Publication
 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET Journal
 
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET Journal
 
Virtual Lunch & Learn - Netherlands
Virtual Lunch & Learn - NetherlandsVirtual Lunch & Learn - Netherlands
Virtual Lunch & Learn - Netherlands
Ivanti
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
IJERA Editor
 
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetAugment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
IRJET Journal
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
Mighty Guides, Inc.
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
Kristin Helgeson
 
Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaire
Priyanka Aash
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
ijctet
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
Frederic Roy-Gobeil, CPA, CGA, M.Tax.
 
IT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesIT Security for Oil and Gas Companies
IT Security for Oil and Gas Companies
Richard Cole
 
Final2[1]
Final2[1]Final2[1]
Final2[1]
MohammedHazzaa1
 
Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)
Ian Sommerville
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidents
belsis
 
Smart Grid Cyber Security Summit Revere
Smart Grid Cyber Security Summit RevereSmart Grid Cyber Security Summit Revere
Smart Grid Cyber Security Summit Revere
hhanebeck
 

What's hot (20)

3rd party information security assessment guideline
3rd party information security assessment guideline3rd party information security assessment guideline
3rd party information security assessment guideline
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
 
ITE - Chapter 10
ITE - Chapter 10ITE - Chapter 10
ITE - Chapter 10
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future Directions
 
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
 
Virtual Lunch & Learn - Netherlands
Virtual Lunch & Learn - NetherlandsVirtual Lunch & Learn - Netherlands
Virtual Lunch & Learn - Netherlands
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetAugment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaire
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
IT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesIT Security for Oil and Gas Companies
IT Security for Oil and Gas Companies
 
Final2[1]
Final2[1]Final2[1]
Final2[1]
 
Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidents
 
Smart Grid Cyber Security Summit Revere
Smart Grid Cyber Security Summit RevereSmart Grid Cyber Security Summit Revere
Smart Grid Cyber Security Summit Revere
 

Similar to IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Storage

IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET Journal
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
Sakamsivasankarreddy
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
Mohammad512578
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
IRJET Journal
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
Mukesh Chinta
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
IRJET Journal
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET Journal
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET Journal
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
bartholomeocoombs
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
annette228280
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
Dotha Keller
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
IRJET Journal
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET Journal
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
IRJET Journal
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
Mukesh Chinta
 

Similar to IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Storage (20)

IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
 
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in CloudIRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive Data
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docxCompensation Strategy for Knowledge WorkersTo prepare for this a.docx
Compensation Strategy for Knowledge WorkersTo prepare for this a.docx
 
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance EssayAccess Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
riddhimaagrawal986
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 

Recently uploaded (20)

学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 

IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Storage

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 670 Image Steganography using Pixel Pattern Matching in Cloud Data Storage K. Usha Nandhini1, K. Swarna2, M.Preetha3, W. Mercy4 1UG Student, Department of CSE, Agni College of Technology, Tamil Nadu, India 4Sr. Assistant Professor, Dept of Computer Science and Engineering, Agni College of Technology, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - With the event of cloud computing, Information security becomes additional and vitalincloudcomputing. This paper analyses the fundamental downside of cloudcomputing information security. Since CloudComputingsharedistributed resources via network withintheopensurroundings, therefore it makes security issues. During this technique, we have a tendency to use Grid choices and Pass Point algorithms. This formula method on the image to urge the component points and therefore the points were used as a secret key for the file uploaded by the user. These techniques were totally different from the standard technique. So here we focus on authentication problem. User authentication is one of the important and fundamental components in most computer security systems. Biometrics is one of the important authentication methods used to tackle the problems associated with traditional username – passwords. But here we will deal with another alternative: using image as password. A graphical password is an authentication system works by having the user interface (GUI). Key Words: Graphical password, security, protection, CaRP. 1. INTRODUCTION Computer security (Also called cyber securityorITsecurity) is data security as applied to computers and networks. The sphere covers all the processors and mechanisms by that computer- based instrumentality, data and services square measure protectedagainstunwittingorunauthorizedaccess, modification or destruction. Laptop security additionally includes protection from unplanned events and natural accidents , fig. 1. Most laptop security measures involve encoding and passwords. Encoding is that the translation of knowledge into a type that’s unintelligible while not a deciphering mechanism. A parole may be a secret word or phrase that offers a user to access a selected program or system. Fig -1: Justify the concerning the secure computing 2. BASIC NEEDS IN THE SECURE COMPUTING If you don’t take basic steps to protect your computer, you put it and all the information on it at risk. Youcanpotentially compromise the operation of the computers on your organizations network, or even the functioning of the network as a whole. 2.1 Physical security: Technical measures like login passwords, anti-virus is essential. (More about those below) However, a secure physical space is the first and more important line of defense. Is the place you keep your workplace computer secure enough to prevent theft or access to it while you are away? While the security Department provides coverage the Medical center, it only takes seconds to steal a computer, particularly a portable device like a laptop or a PDA. A computer should be secured like any other valuable possession when you are not present. Human threats are not the only concern. Computers can be compromised by environment mishaps (e.g., water, coffee) or physical trauma. Make sure the physical location of your computer takes of those risks as well. 2.2 Access passwords: The University’s network and shared information systems are protected in part by login credentials (user-IDs and passwords). Access password is an essential protection for personal computers in ourcircumstances.Officesareusually
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 671 open and shared spaces, so physical access to computers cannot be completely controlled. 2.3 Prying eye protection: We all deal with all facts of clinical research, educational and administrative data here on the medical campus. This is important to do everything possibletominimizeexposure of data to unauthorized individuals. 2.4 Anti-virus software: Enlightened, properly configured anti-virus software is essential. We have server-side anti-virus software on our network computers, you still need it on the client side (your computer). 2.5 Firewalls: Anti-virus products inspect files on your computers and in email. Firewall software and hardware monitor communication between your computer and the outside world. That is essential for any networked computer. 2.6 Software updates: It is critical to keep software up to date, specially the operating system, anti-virus and anti-spyware, email and browser software. The newest versions will containfixes for discovered vulnerability. Mass of anti-virus have automatic updatefeatures(including SAV). Keeping the “SIGNATURES” (digital patterns) of malicious software detectors enlightened is essential for these products to be effective. 2.7 Keep secure backups: Even if you take all these security tread, bad things can still happen. Always be prepared fortheworstbymaking backup copies of critical data, and keeping those backup copies in a separate, secure location. For example, use supplemental hard drives, CDs/DVDs, or flash drives to storecritical,hard- to-replace data. 2.8 Report problems: If you believe that your computer or any data on it has been compromised, you should make a information security incident report. It is required by Universitypolicyforall data on our systems, and legitimately required for health, education, financial and any other kind of record containing identifiable personal information. 3. BENEFITS OF SECURE COMPUTING 3.1 Protect yourself – Civil liability: You may be held amenable to compensate a third party should they experience financial damage or distress as a result of their personal data being stolen from you or leaked by you. 3.2 Protect your credibility - Compliance: You may require compliancy with the Data Protection Act, the FSA, SOX or other regulatory quality. Each of these bodies demand that certain measuresbetakentoprotect the data on your network. 3.3 Protect your reputation – Spam: A common usage for infected systems is to join them to a botnet (a collection of infected machines which takesorders from a command server) and use them to send out spam. This spam can be traced back to you, your server will be blacklisted and you will be unable to send email. 3.4 Protect your income – Competitive advantages: There are a number of “hackers-for-hire” advertising their services on the internet selling their skills in breaking into company’s servers to steal client database, proprietary software, merger and acquisition information, personal detail set. 3.5 Protect your business – Blackmail: A seldom-reported sourceof incomefor“hackers”istobreak into your server, change all your passwords and secure you out of it. The password is then sold back to you. Note: the “hackers” may implant a backdoor program on your server so that can repeat the exercise at will. 3.6 Protect your investment – Free storage: Your server’s hard drive space is used to house the hacker’s video clips, music collections, pirated software or worse. Your server or computer then becomes continuously slow and your internet connection speeds deteriorate due to the number of people connecting to your server in order to download the offered wares. 4. RELATED WORK In this section we have studied few papers which shows about the graphical passwords for security 1. P.C Van Oorschot and J. Thorpe proposed “On predictive models and user drawn graphical passwords” which results quantitatively support suggestions that user-drawn graphical password systems employ measures, such as graphical password rules or guideline and proactive password checking. 2. A. E. Dirik, N. Memon and J.-C. Birget proposed “ Modeling user choice in the Pass Point graphical password scheme ” which results that the model and experiments are small and limited, but they show that user choice can be modeled and that
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 672 expansions of the model and the experiments are promising direction of research. 3. B.Pinkas and T. Sandar proposed “Secure passwords against dictionary attacks” it is easy to implement and overcome some of the difficulties of previously suggested methods of improving the security of user authentication scheme and it provides better protection against denial of service attacks against user accounts. 4. M. Alsaleh, M. Mannan , and P . C. Van Oorschot proposed “Revisiting defenses against large-scale online password guessing attacks” it analyze the performance of PGRP with two real-world data sets and find it more promising than existing proposals. 5. SYSTEM ANALYSIS 5.1 Existing System: The security of the theme continues to be secure if the outflow of the key secret is up to bound bits such the information of those bits doesn’t facilitate to recover the total secret key. However, although victimization outflow resilient primitive will safeguard the outflow of bound bits, there exists another sensible limitation. Suppose we tend to place a part of the key into protection device. The user has to acquire a replacement so he will still decipher his corresponding secret key. This approach are often simply achieved. Still, there exists security risk. If the register may also force to lock the personal computer wherever a part of secret is keep, then it will decipher all cipher text comparable to the victim user. The foremost secure approach is to stop the validity of the taken security. 5.2 Disadvantages of Existing System: 1. If the user has lost his secret key, then his / her corresponding cipher text within the cloud can not be decrypted forever that’s, the approach cannot support secret key update / revocability. 2. Processing step are high. 3. Knowledge loss will occur. 4. Computation price is high. 5.3 Proposed System: In this paper, we present a new security primitive based on AI problems, namely, a NOVEL family of graphical password, which called as Graphical passwords. It addresses a number of security problems, such as online guessing attacks, relay attacks, and if combined with dual-view technologies, shoulder-surfing attacks. The proposed system model is given fig. 2. 5.4 Advantages of Proposed System: 1. Graphical watch word offers protection against online wordbook attacks on passwords, that arefor very long time a significant security threat for varied online services. 2. It additionally offers protection against relay threat to bypass encoding protection. Fig -2: Proposed System Model 6. ALGORITHM In 2005, Pass Point created in order tocoverthelimitationof BLONDER ALGORITHM which was limitation of image. The picture wil be any natural picture or painting butatthesame time should be rich enough in order to have many possible click points. On the contrary, the image is not secret and has no role other than helping the user to remember the click point. Another source of flexibility is thatthereisno needfor artificial predefined click region with well-marked boundaries like BLONDER ALGORITHM. The user is choosing several points on the picture in a particular order. In order to login, the user has to click close to the chosen click point, within some (adjustable)tolerance distance, for example within 0.25cm from actual click point. As in BLONDER ALGORITHM, user had to click on the predefined image at predefined region. Passpoint over comes this by selecting any natural image and having as a many click points as possible which make the system more secure. Passpoint system has the potential for extremely high entropy. As any pixel in the image is the candidate for a click point so there are hundreds of possible memorablepointsin the challenge image. There are numberofresearchingon the characteristics of this model like predicting probabilities of
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 673 likely click point which enables the predictingtheentropy of the click point in a graphical password for a given image. 7. MODULES 7.1 User Registration: In this module, users are having authentication and security to access the cloud. For security, captcha technique is implemented to access the detail which is presented in the image system. Each time users have to enter, registered captcha text and password for accessing the account. The registered data can be stored in a table fig. 3. Fig -3: Register Data in Table Form 7.2 File Synchronization And Security: The user can set up the server after system is opened. Then the user can upload the file to the storage with the key to a0ccess it. The key process is done with grid selection and Pass Point algorithm. By clickingparticularpointatthegiven image, the position of the image pixel is taken as X & Y Co- ordinates as key. These co-ordinates were assigns as X1, Y1 and by clicking on different position 2nd coordinates were assigned as X2, Y2,which is referred in fig.4. In this a password guess tested in an unsuccessful trial isdetermined than traditional approaches. Fig -3: Key Generation for Authorized Users 7.3 User File Request: The request process is done via protocol and key is send to an authorized user through mail. By this process key is shared and the file is viewed/downloaded by the other user with the key given by the data owner. 7.4 Key Generation And Downloading: The number of undetermined positiveidentificationguesses decreases with a lot of trials, resulting in an improved likelihood of finding the positive identification. To counter shot attacks, ancient approaches in planning graphical positive identifications aim at increasing the effective password area to formpasswordsmoredurabletoguessand therefore need a lot of trials, the positive identification will invariably be found by a brute force attack. In this paper, we tend to distinguish key generated through which concept than the normal approaches, and key request method is finished through the protocol with the opposite user to access files. 8. CONCLUSION We have projected CaRP, a replacement security primitive hoping on unsolved onerous AI issues. CaRP is the combination of a Captcha and a graphical secret theme. The notion of CaRP introduces a replacement family of graphical passwords. Like Captcha CaRp utilizes unsolved AI issues. However a watchword is way a lot of valuable to attackers than a free email account that captcha is usually won’t to defend. Thus there square measure a lot of incentives for attackers to hack CaRP than Captcha. That is, a lot of efforts are going to be drawn to the subsequent win-win game by CaRP than normal Captcha: If attackers succeed, they contribute to up AI by providing solutionstoopenissueslike segmenting second texts. Otherwise, our system stays secure, conductive to sensible security. As a framework, CaRP doesn’t think about any specific Captcha theme. Once one Captcha theme is broken, a brand new and safer one could seem and be regenerate to CaRP theme. Overall, our work is one break through within the paradigm of mistreatment exhausting AI issues or security. Of cheap security and value and sensible applications,CaRPhassmart potential for refinements, that concern helpful future work. A lot of significantly, we have a tendency to expect CaRP to inspire new inventions of such AI based mostly security primitives. 9. REFERENCES: [1] Mudassar Ali Khan, Ikram Ud Din, Sultan Ullah Jadoon, Muhmmad Khurram Khan, Mohsen Guizani, KamranAhmad Awan “g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices”, 2019, IEEE Transaction on Consumer Elctronics. [2] (2012, Eeb) The Science Behind Passfaces [Online] Available: http://www.realuser.com/published/ScienceBehindPassfac es.pdf [3] I.Jermyn , A.Mayer, F.Monrose, M.Reiter and A.Rubin, “The design and analysis of graphical passwords,” inProc. 8th USENIX Security Symp, 1999, pp.1-5. [4] H. Toa and C. Adams, “Pass-Go: A proposal toimprovethe usability of graphical passwords” Int. J. Net Security, vol.7, no.2, pp. 273-292, 2008.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 674 [5] S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Menon, “Pass Point: Design and longitudinal evaluation of graphical password system” In. J. HCI, vol.102-127,Jul.2005. [6] P. C. van Oorschot and J. Thrope, “On predictive models and user drawn graphical passwords” ACM Trans. Inf. Syst. Security, vol. 10, no. 4, pp. 1-33, 2008. [7] K. Golofit, “Click passwords underinvestigation,”inproc. ESORICS, 2007, pp. 343-358. [8] A. E. Dirik, N. Memon and J.-C Birget, “Modeling user choice in the passpoints graphical scheme” in proc. Symp. Usable Privacy Security, 2007, pp. 20-28. [9] J. Thorpe and P.C. van Oorschot “Human-seeded attacks and exploiting hot spots in graphical passwords” in proc. USENIX Security, 2007, pp. 103-118. [10] P.C. van Oorschot, A. Salehi-Abari, and J.Thorpe “Purely automated attacksonpassPoints-stylegraphical passwords” IEEE Trans. Forensics Security, vol.5, no.3, pp. 393-405, Sep.2010.