SlideShare a Scribd company logo
SECURE
COMMUNICATION
MEMBERS
 TUSHAR SWAMI
 VIKAS PRASAD
 TANISH GARG
ACKNOWLEDGEMENT
We would like to express our special thanks of gratitude to our teacher Dr. Natasha who
gave us the golden opportunity to present this wonderful presentation on the topic
(Secure Communication), which also helped us in doing a lot of Research and we came
to know about new things. We are really thankful to her.
SECURE COMMUNICATION?
When two entities are communicating and don’t want any third party to listen.
WHAT IS BEING DISCUSSED TILL NOW…
effective ways to communicate
Communicating
Method
Data Security
SUCCESSFUL COMMUNICATION
WHY DO WE NEED THIS?
 We are living in an information age.
 We need to keep information about every aspect of life,
so “INFORMATION IS AN ASSET”.
 Thus, needed to be secured from attacks and misuse.
Secured Information means What?
– Confidentiality
Ensuring that information is
accessible only to those authoriz
ed to have access
– Integrity
Safeguarding the accuracy and
completeness of information and
processing methods
– Availability
Ensuring that authorized users
have access to information and
associated assets when required
Threatening Attacks
BSecret
C
A
SNOOPING
Threatening Attacks
MODIFICATION
C
CTransfer Rs.1000/-
to B.
Transfer Rs.10000/-
to C.
Ideal Route of the Message
Actual Route of the Message
A B
HOW TO ACHIEVE IT?
 Most commonly used method : CRYPTOGRAPHY.
 It achieves security by encoding messages to make them unreadable.
 Mathematical operations are applied on data to encrypt it.
 KEY – used for encryption and decryption of data.
Cryptography
Symmetric (one key)
Asymmetric (two keys)
CRYPTOGRAPHY
Plaintext
Shared
Secret Key
Ciphertext
Encryption
Algorithm
Plaintext
Shared
Secret Key
Ciphertext
Decryption
Algorithm
Secure Key-exchange Channel
Insecure channel
Its Cipher text Message is
Kl Ekdudw,
Krsh brxduhgrlqj ilqh.Krz derxw phhwlqj d
w wkh wudlq vwdwlrq wklv Iulgdb dw5 sp?
Plaintext Message
Hi Bharat,
Hope you are doing fine. How about meeti
ng at the train station this Friday at 5 pm?
DATA MASKING
DATA MASKING
 Data masking is a method of creating a structurally similar but inauth
entic version of an organization's data that can be used for purposes
such as software testing and user training.
 The purpose is to protect the actual data while having a functional
substitute for occasions when the real data is not required.
 The main reason for applying masking to a
data field is to protect data that is classified as
personal identifiable data, personal sensitive data.
EXAMPLE
TYPES OF DATA MASKING
DATAMASKING
Static
On-the-fly
Dynamic
 STATIC DATA MASKING
- Static Data Masking is done on the golden copy of the data base.
- Reduce the data set to a subset that holds the data necessary for a
particular round of testing, apply necessary code changes from source
control and push data to desired environment.
 ON-THE-FLY DATA MASKING
On-the-Fly Data Masking happens in the process of transfer-
ring data from environment to environment without data
touching the disk on its way.
 DYNAMIC DATA MASKING
Dynamic data masking happens at runtime, dynamically,
and on-demand so that there need not be a second data
source where to store the masked data dynamically.
TECHNIQUES OF DATA MASKING
Substitution Method
• It allows the masking to be
performed in such a manner
that another authentic looking
value can be substituted for
the existing value.
• 1: 1 mapping is done.
Shuffling Method
The shuffling method is a ve
ry common form of data obf
uscation. It is similar to the s
ubstitution method but it de
rives the substitution set fro
m the same column of data
that is being masked.
MASKING OUT
• Character scrambling or masking out of certain fields is also another
simplistic yet very effective method of preventing sensitive information
to be viewed.
• This is commonly applied to credit card data in production
systems.
Example : Credit Card No. XXXX XXXX XXXX 6789.
Applications
1) Used in Application and Software testing.
2) Used in various training programmes.
3) Used in Banking Facilities.
4) Used in customer service facilities like Call centres.
STEGANOGRAPHY
STEGANOGRAPHY
 Steganography refers to the art and science of hiding secret
information in some other media.
 The information to be hided is called the secret message.
 The medium in which the information is hidden is called the
cover document.
 The cover document containing hidden message is called the
s stego-document.
STEGANOGRAPHY
STEGANOGRAPHY APPROACH
There are two main approaches for Steganography.
SPATIAL DOMAIN APPROACH
The Data is hidden in the spatial domain of the cover document.
FREQUENCY DOMAIN APPROACH
Transform domain methods hide messages in non-significant areas of
the cover document.
APPLICATIONS
1) PRINTER STEGANOGRAPHY
Some modern printers use steganography, like HP laser printers These
printers add tiny yellow dots to each page.
2) Used by intelligence services and
many other organisations.
DIGITAL WATERMARKING
• Act of hiding a message related to a digital signal within the signal itself
• Watermarking tries to hide a message related to the actual content of the digital signal
• In steganography the digital signal has no relation to the message
INTRODUCTION
APPLICATIONS
1) Broadcast monitoring-
-To track when a specific video is being broadcast by a TV station.
-Important to advertising agencies
Information used to identify individual videos could be embedded in the videos
themselves using watermarking, making broadcast monitoring easier.
2) Owner identification-
-To identify the owner of a specific digital work of art(video or image)
-Important task, especially in cases related to copyright infringement.
So, instead of including copyright notices with every image or song, we could
use watermarking to embed the copyright in the image or the song itself.
Applications(contd.)
3) Transaction tracking-
-To record the recipient of every legal copy of a movie
-By embedding a different watermark in each copy.
If the movie is then leaked to the Internet, the movie producers could identify
which recipient of the movie was the source of the leak.
4) copy control-
-To prevent the illegal copying of songs
By embedding a watermark in them that would instruct a watermarking
compatible DVD or CD writer to not write the song or movie because it is an
illegal copy.
PROPERTIES
• Effectiveness - Probability that the message in a watermarked image will be correctly
detected
• Image fidelity - Watermarking is a process that alters an original image to add a
message to it
• The payload size - The size of embedded message is often important as many
systems require a relatively big payload to be embedded in a cover work.
• The false positive rate - This is the number of digital works that are identified to
have a watermark embedded when in fact they have no watermark embedded.
• Robustness - A robust watermark should be able to withstand additive Gaussian
noise, compression, printing and scanning, rotation, scaling, cropping, etc.
• very similar to the traditional models
of communication systems
• Watermarking - a process of
communicating a message from the
watermarking embedder to the
watermarking receiver.
• images, can be viewed as high-
dimensional vectors, called the media
space.
• For example a 512 X 512 image
would be described as a 262144
elements vector in a 262144-
dimensional space.
• useful to better visualize the
watermarking process using a
number of regions
WATERMARKING
MODELS
Communication-
based view
Geometric view
• The embedding region- all the possible images resulting from the
embedding of a message inside an unwatermarked image
• The detection region - images from which a watermark can be
successfully extracted
• The region of acceptable fidelity - images resulting from the
embedding of a message into an unwatermarked image(identical to
the original image)
• The embedding region for a given watermarking system lie inside the
intersection of the detection region and the region of acceptable
fidelity
GEOMETRIC MODEL
Communication-based Model
• Sender on one side would encode a message
using encoding key
• Then the message would be transmitted on a
communications channel, which would add
some noise to encoded message
• The resulting noisy message would be received
at the other end, which would decode it using a
decoding key, to get the original message back
• Can be further divided into two sub-categories:
• Uses side-information
• Does not use side-information at all
The term side information refers to any auxiliary
information except the input message itself, that can
be used to better encode or decode it.
Watermarking without
side-information
• The image is simply considered as
another form of channel noise that
distorts the message during its
transmission
• The watermark embedder encodes a
message using a watermark encoder and
a key
• This is then added to the original image
and transmitted over the communication
channel which adds some noise
• The watermark detector at the other end
receives the noisy watermarked image
and decode the original image using a
key
Watermarking with side-information
• The only difference is the use of the
original image
• The watermark embedder still encodes a
message using not only a key but also
the information provided by the original
image
• The resulting encoded message is then
added to the original image as in the
case of the no-side-information model
• The watermarking detector tries to get
the original message back using the
original key and a detection algorithm
REAL WORLD
APPLICATIONS
TELECOMMUNICATION
MOBILE PHONES
 Signal most vulnerable to attack when going
from tower to mobile device.
 Hence, encryption method is needed there.
 To avoid eavesdropping, the cipher key
is sent separately.
WHATSAPP
Few months ago, WhatsApp employed
end-to-end encryption mechanism to
ensure its users’ messages security.
SECURE NETWORK COMMUNICATIONS
SECURE SOCKET LAYER (SSL)
 a public-key protocol for providing data security layered between TCP/IP.
 used for establishing an encrypted link between a server and a client.
 SSL allows sensitive information to be transmitted securely.
 SSL secures millions of peoples' data on the Internet every day, especially when
transmitting some confidential information.
HOW TO SPOT A SSL-SECURED WEBSITE
 They have a lock icon being displayed or green
address bar that comes with an extended validation
for SSL-secured website.
 SSL-secured websites also begin with https rather
than http.
Numbers
Exchanged
Diffie-Hellman Key Exchange
ExchangeKey = (Generator^SecretNumber) mod Prime
FinalKey = (ExchangeKey^SecretNumber) mod Prime
 Majorly used techniques for data security explained.
 But attackers are getting advanced with time.
 Hence, this field requires constant development.
So that people can rely more on the new communication techniques
rather than conventional methods, and our PM’s dream of
“DIGITAL INDIA” can become a propitious reality.
REFERENCES
• https://www.cl.cam.ac.uk/teaching/0910/R08/work/essay-ma485-watermarking.pdf
• https://hal.archives-ouvertes.fr/file/index/docid/86383/filename/TIP_DEC05.pdf
• https://cryptomath.files.wordpress.com/2008/08/playfair-cipher.ppt
• cc.ee.ntu.edu.tw/~farn/courses/BCC/NTUEE/2013.spring/projects/Team2.pptx
• http://www.garykessler.net/library/crypto.html
• http://www.ijcta.com/
• https://www.scribd.com/doc/27154173/Project-Report-Sample
• https://cyfor.engineering.nyu.edu/wp-content/uploads/2015/08/steg1.png
• https://www.clear.rice.edu/elec301/Projects01/steganosaurus/background.html
• http://media.merchantcircle.com/19869322/PLANSAHEAD_CROP_full.jpeg
• https://cdn.instructables.com/FX0/FWT8/HMWOI1YJ/FX0FWT8HMWOI1YJ.MEDI.jpg
• http://www.clipartkid.com/november-progress-december-intentions-jg8hyH-clipart/
• http://www.clipartbest.com/cliparts/9iz/Ede/9izEdeGiE.jpeg
• http://cliparts.co/cliparts/di4/LAX/di4LAXG5T.jpg
CONCLUSION

More Related Content

What's hot

Symmetric Key Algorithm
Symmetric Key AlgorithmSymmetric Key Algorithm
Symmetric Key Algorithm
SHUBHA CHATURVEDI
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
Dr Naim R Kidwai
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
parvez Sharaf
 
Cryptography
CryptographyCryptography
Cryptography
jayashri kolekar
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
Subhash Gupta
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
Naveen Kumar
 
Hash Function
Hash FunctionHash Function
Hash Function
Siddharth Srivastava
 
Email investigation
Email investigationEmail investigation
Email investigation
Animesh Shaw
 
User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
Jim Fenton
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.ppt
reshmy12
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
Thushara92
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
ajeet singh
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
Rajapriya82
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
trilokchandra prakash
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla
 
Cryptography
CryptographyCryptography
Cryptography
Sidharth Mohapatra
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
Zaheer720515
 

What's hot (20)

Symmetric Key Algorithm
Symmetric Key AlgorithmSymmetric Key Algorithm
Symmetric Key Algorithm
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Email investigation
Email investigationEmail investigation
Email investigation
 
User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
 
Encryption.ppt
Encryption.pptEncryption.ppt
Encryption.ppt
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 

Similar to Secure communication

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
prdpgpt
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
IRJET Journal
 
1709 1715
1709 17151709 1715
1709 1715
Editor IJARCET
 
1709 1715
1709 17151709 1715
1709 1715
Editor IJARCET
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
Ahmed Nour
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
International Journal of Technical Research & Application
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
Iaetsd Iaetsd
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
JIEMS Akkalkuwa
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
IJSRD
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
 
Homomorphic Encryption: Unveiling secrets without exposing them
Homomorphic Encryption: Unveiling secrets without exposing themHomomorphic Encryption: Unveiling secrets without exposing them
Homomorphic Encryption: Unveiling secrets without exposing them
MuhammedYaseen39
 
Ppt nc
Ppt ncPpt nc
Ppt nc
Pooja Shukla
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
ijsrd.com
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518
IJRAT
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
IJNSA Journal
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
CSCJournals
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
Journal For Research
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
vijay rastogi
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
sudip nandi
 

Similar to Secure communication (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...A Review on Robust Digital Watermarking based on different Methods and its Ap...
A Review on Robust Digital Watermarking based on different Methods and its Ap...
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
Homomorphic Encryption: Unveiling secrets without exposing them
Homomorphic Encryption: Unveiling secrets without exposing themHomomorphic Encryption: Unveiling secrets without exposing them
Homomorphic Encryption: Unveiling secrets without exposing them
 
Ppt nc
Ppt ncPpt nc
Ppt nc
 
Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
 
Paper id 312201518
Paper id 312201518Paper id 312201518
Paper id 312201518
 
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIASTAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
STAGE STAFFING SCHEME FOR COPYRIGHT PROTECTION IN MULTIMEDIA
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
Report on Digital Watermarking Technology
Report on Digital Watermarking Technology Report on Digital Watermarking Technology
Report on Digital Watermarking Technology
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 

More from Tushar Swami

Consumer Protection Act
Consumer Protection ActConsumer Protection Act
Consumer Protection Act
Tushar Swami
 
HUL financial analysis 2017-19
HUL financial analysis 2017-19HUL financial analysis 2017-19
HUL financial analysis 2017-19
Tushar Swami
 
Indian AS 3
Indian AS 3Indian AS 3
Indian AS 3
Tushar Swami
 
Industrial Automation
Industrial AutomationIndustrial Automation
Industrial Automation
Tushar Swami
 
Greener mobile phones
Greener mobile phonesGreener mobile phones
Greener mobile phones
Tushar Swami
 
Oscillators
OscillatorsOscillators
Oscillators
Tushar Swami
 
Biophotonics
BiophotonicsBiophotonics
Biophotonics
Tushar Swami
 
Cryptography
CryptographyCryptography
Cryptography
Tushar Swami
 
RISC - Reduced Instruction Set Computing
RISC - Reduced Instruction Set ComputingRISC - Reduced Instruction Set Computing
RISC - Reduced Instruction Set Computing
Tushar Swami
 
Morse code (-- --- .-. ... . -.-. --- -.. .)
Morse code (-- --- .-. ... . -.-. --- -.. .)Morse code (-- --- .-. ... . -.-. --- -.. .)
Morse code (-- --- .-. ... . -.-. --- -.. .)
Tushar Swami
 
Mhealth - mobile health
Mhealth - mobile healthMhealth - mobile health
Mhealth - mobile health
Tushar Swami
 
Heliophysics - The Study of the Sun
Heliophysics - The Study of the SunHeliophysics - The Study of the Sun
Heliophysics - The Study of the Sun
Tushar Swami
 
Molecular Orbital Theory (MOT)
Molecular Orbital Theory (MOT)Molecular Orbital Theory (MOT)
Molecular Orbital Theory (MOT)
Tushar Swami
 
Cathode Ray Oscilloscope (CRO)
Cathode Ray Oscilloscope (CRO)Cathode Ray Oscilloscope (CRO)
Cathode Ray Oscilloscope (CRO)
Tushar Swami
 

More from Tushar Swami (14)

Consumer Protection Act
Consumer Protection ActConsumer Protection Act
Consumer Protection Act
 
HUL financial analysis 2017-19
HUL financial analysis 2017-19HUL financial analysis 2017-19
HUL financial analysis 2017-19
 
Indian AS 3
Indian AS 3Indian AS 3
Indian AS 3
 
Industrial Automation
Industrial AutomationIndustrial Automation
Industrial Automation
 
Greener mobile phones
Greener mobile phonesGreener mobile phones
Greener mobile phones
 
Oscillators
OscillatorsOscillators
Oscillators
 
Biophotonics
BiophotonicsBiophotonics
Biophotonics
 
Cryptography
CryptographyCryptography
Cryptography
 
RISC - Reduced Instruction Set Computing
RISC - Reduced Instruction Set ComputingRISC - Reduced Instruction Set Computing
RISC - Reduced Instruction Set Computing
 
Morse code (-- --- .-. ... . -.-. --- -.. .)
Morse code (-- --- .-. ... . -.-. --- -.. .)Morse code (-- --- .-. ... . -.-. --- -.. .)
Morse code (-- --- .-. ... . -.-. --- -.. .)
 
Mhealth - mobile health
Mhealth - mobile healthMhealth - mobile health
Mhealth - mobile health
 
Heliophysics - The Study of the Sun
Heliophysics - The Study of the SunHeliophysics - The Study of the Sun
Heliophysics - The Study of the Sun
 
Molecular Orbital Theory (MOT)
Molecular Orbital Theory (MOT)Molecular Orbital Theory (MOT)
Molecular Orbital Theory (MOT)
 
Cathode Ray Oscilloscope (CRO)
Cathode Ray Oscilloscope (CRO)Cathode Ray Oscilloscope (CRO)
Cathode Ray Oscilloscope (CRO)
 

Recently uploaded

CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 

Recently uploaded (20)

CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 

Secure communication

  • 2. MEMBERS  TUSHAR SWAMI  VIKAS PRASAD  TANISH GARG
  • 3. ACKNOWLEDGEMENT We would like to express our special thanks of gratitude to our teacher Dr. Natasha who gave us the golden opportunity to present this wonderful presentation on the topic (Secure Communication), which also helped us in doing a lot of Research and we came to know about new things. We are really thankful to her.
  • 4. SECURE COMMUNICATION? When two entities are communicating and don’t want any third party to listen. WHAT IS BEING DISCUSSED TILL NOW… effective ways to communicate Communicating Method Data Security SUCCESSFUL COMMUNICATION
  • 5. WHY DO WE NEED THIS?  We are living in an information age.  We need to keep information about every aspect of life, so “INFORMATION IS AN ASSET”.  Thus, needed to be secured from attacks and misuse.
  • 6. Secured Information means What? – Confidentiality Ensuring that information is accessible only to those authoriz ed to have access – Integrity Safeguarding the accuracy and completeness of information and processing methods – Availability Ensuring that authorized users have access to information and associated assets when required
  • 8. Threatening Attacks MODIFICATION C CTransfer Rs.1000/- to B. Transfer Rs.10000/- to C. Ideal Route of the Message Actual Route of the Message A B
  • 10.  Most commonly used method : CRYPTOGRAPHY.  It achieves security by encoding messages to make them unreadable.  Mathematical operations are applied on data to encrypt it.  KEY – used for encryption and decryption of data. Cryptography Symmetric (one key) Asymmetric (two keys) CRYPTOGRAPHY
  • 11. Plaintext Shared Secret Key Ciphertext Encryption Algorithm Plaintext Shared Secret Key Ciphertext Decryption Algorithm Secure Key-exchange Channel Insecure channel Its Cipher text Message is Kl Ekdudw, Krsh brxduhgrlqj ilqh.Krz derxw phhwlqj d w wkh wudlq vwdwlrq wklv Iulgdb dw5 sp? Plaintext Message Hi Bharat, Hope you are doing fine. How about meeti ng at the train station this Friday at 5 pm?
  • 13. DATA MASKING  Data masking is a method of creating a structurally similar but inauth entic version of an organization's data that can be used for purposes such as software testing and user training.  The purpose is to protect the actual data while having a functional substitute for occasions when the real data is not required.  The main reason for applying masking to a data field is to protect data that is classified as personal identifiable data, personal sensitive data.
  • 15. TYPES OF DATA MASKING DATAMASKING Static On-the-fly Dynamic
  • 16.  STATIC DATA MASKING - Static Data Masking is done on the golden copy of the data base. - Reduce the data set to a subset that holds the data necessary for a particular round of testing, apply necessary code changes from source control and push data to desired environment.  ON-THE-FLY DATA MASKING On-the-Fly Data Masking happens in the process of transfer- ring data from environment to environment without data touching the disk on its way.  DYNAMIC DATA MASKING Dynamic data masking happens at runtime, dynamically, and on-demand so that there need not be a second data source where to store the masked data dynamically.
  • 17. TECHNIQUES OF DATA MASKING Substitution Method • It allows the masking to be performed in such a manner that another authentic looking value can be substituted for the existing value. • 1: 1 mapping is done.
  • 18. Shuffling Method The shuffling method is a ve ry common form of data obf uscation. It is similar to the s ubstitution method but it de rives the substitution set fro m the same column of data that is being masked.
  • 19. MASKING OUT • Character scrambling or masking out of certain fields is also another simplistic yet very effective method of preventing sensitive information to be viewed. • This is commonly applied to credit card data in production systems. Example : Credit Card No. XXXX XXXX XXXX 6789. Applications 1) Used in Application and Software testing. 2) Used in various training programmes. 3) Used in Banking Facilities. 4) Used in customer service facilities like Call centres.
  • 21. STEGANOGRAPHY  Steganography refers to the art and science of hiding secret information in some other media.  The information to be hided is called the secret message.  The medium in which the information is hidden is called the cover document.  The cover document containing hidden message is called the s stego-document.
  • 23. STEGANOGRAPHY APPROACH There are two main approaches for Steganography. SPATIAL DOMAIN APPROACH The Data is hidden in the spatial domain of the cover document. FREQUENCY DOMAIN APPROACH Transform domain methods hide messages in non-significant areas of the cover document.
  • 24. APPLICATIONS 1) PRINTER STEGANOGRAPHY Some modern printers use steganography, like HP laser printers These printers add tiny yellow dots to each page. 2) Used by intelligence services and many other organisations.
  • 26. • Act of hiding a message related to a digital signal within the signal itself • Watermarking tries to hide a message related to the actual content of the digital signal • In steganography the digital signal has no relation to the message INTRODUCTION
  • 27. APPLICATIONS 1) Broadcast monitoring- -To track when a specific video is being broadcast by a TV station. -Important to advertising agencies Information used to identify individual videos could be embedded in the videos themselves using watermarking, making broadcast monitoring easier. 2) Owner identification- -To identify the owner of a specific digital work of art(video or image) -Important task, especially in cases related to copyright infringement. So, instead of including copyright notices with every image or song, we could use watermarking to embed the copyright in the image or the song itself.
  • 28. Applications(contd.) 3) Transaction tracking- -To record the recipient of every legal copy of a movie -By embedding a different watermark in each copy. If the movie is then leaked to the Internet, the movie producers could identify which recipient of the movie was the source of the leak. 4) copy control- -To prevent the illegal copying of songs By embedding a watermark in them that would instruct a watermarking compatible DVD or CD writer to not write the song or movie because it is an illegal copy.
  • 29. PROPERTIES • Effectiveness - Probability that the message in a watermarked image will be correctly detected • Image fidelity - Watermarking is a process that alters an original image to add a message to it • The payload size - The size of embedded message is often important as many systems require a relatively big payload to be embedded in a cover work. • The false positive rate - This is the number of digital works that are identified to have a watermark embedded when in fact they have no watermark embedded. • Robustness - A robust watermark should be able to withstand additive Gaussian noise, compression, printing and scanning, rotation, scaling, cropping, etc.
  • 30. • very similar to the traditional models of communication systems • Watermarking - a process of communicating a message from the watermarking embedder to the watermarking receiver. • images, can be viewed as high- dimensional vectors, called the media space. • For example a 512 X 512 image would be described as a 262144 elements vector in a 262144- dimensional space. • useful to better visualize the watermarking process using a number of regions WATERMARKING MODELS Communication- based view Geometric view
  • 31. • The embedding region- all the possible images resulting from the embedding of a message inside an unwatermarked image • The detection region - images from which a watermark can be successfully extracted • The region of acceptable fidelity - images resulting from the embedding of a message into an unwatermarked image(identical to the original image) • The embedding region for a given watermarking system lie inside the intersection of the detection region and the region of acceptable fidelity GEOMETRIC MODEL
  • 32. Communication-based Model • Sender on one side would encode a message using encoding key • Then the message would be transmitted on a communications channel, which would add some noise to encoded message • The resulting noisy message would be received at the other end, which would decode it using a decoding key, to get the original message back • Can be further divided into two sub-categories: • Uses side-information • Does not use side-information at all The term side information refers to any auxiliary information except the input message itself, that can be used to better encode or decode it.
  • 33. Watermarking without side-information • The image is simply considered as another form of channel noise that distorts the message during its transmission • The watermark embedder encodes a message using a watermark encoder and a key • This is then added to the original image and transmitted over the communication channel which adds some noise • The watermark detector at the other end receives the noisy watermarked image and decode the original image using a key
  • 34. Watermarking with side-information • The only difference is the use of the original image • The watermark embedder still encodes a message using not only a key but also the information provided by the original image • The resulting encoded message is then added to the original image as in the case of the no-side-information model • The watermarking detector tries to get the original message back using the original key and a detection algorithm
  • 37. MOBILE PHONES  Signal most vulnerable to attack when going from tower to mobile device.  Hence, encryption method is needed there.  To avoid eavesdropping, the cipher key is sent separately. WHATSAPP Few months ago, WhatsApp employed end-to-end encryption mechanism to ensure its users’ messages security.
  • 38. SECURE NETWORK COMMUNICATIONS SECURE SOCKET LAYER (SSL)  a public-key protocol for providing data security layered between TCP/IP.  used for establishing an encrypted link between a server and a client.  SSL allows sensitive information to be transmitted securely.  SSL secures millions of peoples' data on the Internet every day, especially when transmitting some confidential information. HOW TO SPOT A SSL-SECURED WEBSITE  They have a lock icon being displayed or green address bar that comes with an extended validation for SSL-secured website.  SSL-secured websites also begin with https rather than http.
  • 39.
  • 40. Numbers Exchanged Diffie-Hellman Key Exchange ExchangeKey = (Generator^SecretNumber) mod Prime FinalKey = (ExchangeKey^SecretNumber) mod Prime
  • 41.  Majorly used techniques for data security explained.  But attackers are getting advanced with time.  Hence, this field requires constant development. So that people can rely more on the new communication techniques rather than conventional methods, and our PM’s dream of “DIGITAL INDIA” can become a propitious reality.
  • 42. REFERENCES • https://www.cl.cam.ac.uk/teaching/0910/R08/work/essay-ma485-watermarking.pdf • https://hal.archives-ouvertes.fr/file/index/docid/86383/filename/TIP_DEC05.pdf • https://cryptomath.files.wordpress.com/2008/08/playfair-cipher.ppt • cc.ee.ntu.edu.tw/~farn/courses/BCC/NTUEE/2013.spring/projects/Team2.pptx • http://www.garykessler.net/library/crypto.html • http://www.ijcta.com/ • https://www.scribd.com/doc/27154173/Project-Report-Sample • https://cyfor.engineering.nyu.edu/wp-content/uploads/2015/08/steg1.png • https://www.clear.rice.edu/elec301/Projects01/steganosaurus/background.html • http://media.merchantcircle.com/19869322/PLANSAHEAD_CROP_full.jpeg • https://cdn.instructables.com/FX0/FWT8/HMWOI1YJ/FX0FWT8HMWOI1YJ.MEDI.jpg • http://www.clipartkid.com/november-progress-december-intentions-jg8hyH-clipart/ • http://www.clipartbest.com/cliparts/9iz/Ede/9izEdeGiE.jpeg • http://cliparts.co/cliparts/di4/LAX/di4LAXG5T.jpg