International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 4, Issue 6 (Nov-Dec 2016), PP.93-98 Data Storage Security Using Steganography Techniques 1 Nancy Garg, 2 Kamalinder Kaur 1,2 Computer Science Of Engineering And Technology, Chandigarh Engineering College , IK Gujral Punjab Technical University, LANDRAN, INDIA 1 [email protected] Abstract— Cloud computing is an advanced technology systems .Public key system uses two keys that is public key throughout the world. As cloud computing is based on Internet which is known to everyone and private key which is used by which is a computer technology. The computer store in the only the recipient of messages. Symmetric key system use a available space and whenever it is requested by the authenticated single key that both the receiver and the sender have .In user it retrieve the stored information. Measures of security that process of Cryptography, a cipher message, may provoke are assumed in the cloud should be made available to the customers for gaining their trust. Steganography is used to hide suspicion on the behalf of the recipient while message which data. First acquire an image from various sources and will read is invisible created with method of steganography will not. the required details of an image. After that secret data is read However, when the use of cryptography is illegal ,then and is converted into integer values. Then it is encrypted and steganography is useful .However, cryptography and embedded with the cover image with the use of transform steganography are judged in a different way. When the method. Security of the embedded data can be enhanced by the "enemy" can access the data Cryptography fails, while when steganography model. The main problem with conventional key the "enemy" detects in the steganographic medium that there is cryptography is that it is a very hard job to keep symmetric key a message that is secret is present then steganography fails 3. safe from people other than sender and receiver. The single Security of the embedded data can be enhanced by the layered XOR operation based encryption model is considered very weak against several cryptanalysis attacks to decode the combination of these two methods. This combination of two encrypted data without using the encryption key. The frequency methods will satisfy the various requirements as , security, embedding method has been designed to overcome all such capacity and robustness for secure transmission of data over problems.This technique has implemented using Progressive channel that is open. Although both methods are providing the Exponential Clustering algorithm. The performance parameters security individually , to provide strong security we proposes to such as Peak Signal to Noise Ratio (PSNR) and Mean Squared combine both method steganography and cryptography into Error (MSE) are used for the result evaluation of the proposed one system, by using data encryption at two levels . After the model. encryption of data is done, the encrypted text will be hidden behind the image using steganographic technique that is least Keywords— Steganography, Least Significant Bit, Embedding Algorithm, Pseudo Random, Progressive Exponential Clustering significant bit( LSB). algorithm. A. Steganography I. INTRODUCTION Steganography is mostly confused with method of cryptography, though they are two different fields. Cloud computing is an advanced technology throughout the world. As cloud computing is based on Internet which is a Cryptography is the process of using a key or password making computer technology. Firms like Amazon, Microsoft and the message in the readable format. Steganography hides the fact of presence of message that is secret. In the world of today Google to speed up their business have implemented the due to lack of privacy Steganography field is a very important. "CLOUD". Cloud computing has given a new shape to the People communicate with each other without scrutiny of each (SaaS, PaaS and IaaS) and provide cheaper powerful processor with these computing architecture. The computer other through Steganography, because everyone involved in store in the available space and whenever it is requested by the communication unaware about the encoding of secret message. authenticated user it retrieve the stored information1. We can store any kind of data that we use in our day to day life such as B. Hiding data using steganography photographs, songs, or movies and huge amounts of For hiding a message along a digital message, we take use confidential data. These are the basic service which is offered the least significant bit within each image pixel. Value of color by cloud computing. So Cloud is a pool of computing service in each image is stored in each pixel of image which is made of on large scale .Now days users can subscribe even high quality three eight bit integers. For example, 255 green, 255 red,and 0 data and software services that reside on remote data centers blue makes the yellow color. It is possible to hide a secret due to the increasing network bandwidth and reliability yet message by replacing in each of the color values the LSB.It is flexible network connections2. also possible to hide a message that is secret, without changing The Steganography helps in hiding the message in such a the values of color too much,bit by bit. way that it cannot be seen .However, Cryptography systems can be classified into public-key systems and symmetric-key 93 | P a g e International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 4, Issue 6 (Nov-Dec 2016), PP.93-98 C. Types of steganography B Masking and Filtering During early days only gray scale . images are used. In this type MSB bits are used. Lossy A .Text Steganography This process considers the various compression of images are efficiently used. letters positions . The amount of content that is hidden in text C Transform Domain Technique This method uses the type is too less and can be easily made recoverable by letters MSB for data hiding. There is no dependency on the image frequency. There are many methods which are used as text formats7. The technique Transform domain is more robust steganography such as Oldest technique in which Text is used than LSB because it focus on the parts of the image that are not as a cover medium . Message which is Secret can be detected changed by editing of image like resizing ,cropping. This by taking the file's every word first letter.Hiding of text in technique works in both lossless and lossy compression hypertext mark-up languages (HTML),Text Steganography in images. word's specific characters, method of Line shifting ,Open II. RELATED WORK spaces ,Shifting of Word , Encoding of Character 4 . Premkumar Jain,Manoj Kokane, Poonam Sarangdhar B. Image Steganography Various calculations are used by [2013]: In this paper some services are proposed for security people now a days. Image pixels are selected randomly and of data and access control of data which is sensitive and then replacing the text ASCII values is unbreakable algorithm. outsourced on server of cloud for sharing. In this paper two Cryptography and Steganography joins its hand to make the issues are addressed which are policies for accessing attributes Steganography of image more robust .We see that human get of data is defined and enforced and other owner of data is attracted towards images more than text. Pages of Internet are allowed for assigning the task of computation to the cloud popular due to its attractive pictures. Change in the LSB of the server which is untrusted without disclosure of any content of image goes unnoticed by an human eye .Using this concept data. For further achieving a secure and dependable service of secret information is hidden in the images5. cloud storage, in this paper a auditing mechanism for flexible C. Audio Steganography This is another method where storage integrity which is distributed in nature, using the token Steganographers focus in these audio files for their secret which is homomorphic and data which is distributed coded is message. Digital files are used to conceal message. In the day proposed. Dynamic operations of data is supported effectively. today life people hears music. People downloads free music It is important to locate the server which misbehaves so that from internet through mobile phones ,PDA, and pc which the users could access the sensitive data without doing any popular music files . There are few techniques for embedding changes. This system is fullproof for crash of data and attack the data secretly into digital audio such as Phase coding,LSB on server. coding, spread spectrum,Parity coding. Nikita pathrabe, Deepali khtawar [2014]:In this paper D. Protocol Steganography Protocol is defined as a set of mechanism is proposed to prevent unauthorized access of data rules which is used for governing the communication . Some which is stored on cloud server.For providing the data security of the protocols are IP, TCP, UDP which are used for in cloud distributed scheme using token that is homomorphic is communication. This protocols are used by Steganographers to used.Security mechanisms for ensuring the data integrity hide their secret data. Parts of the protocol packet header means as the cloud supports redundancy of data where user can which are unused are efficiently used for hiding the message6. insert ,update or delete the data.This paper also proposed the scheme for securing the data when server misbehaves. The main focus is on ensuring the security of data storage on cloud D. METHODS OF STEGANOGRAPHY which is the essential aspect of QOS. Images are categorized according to the number of bits in a Deepanchakaravarthi, Dr.Sunitha Abburu and pixel.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages6 Page
-
File Size-