A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kalpana, V.
- Image Steganography Using Ken Ken Puzzle for Secure Data Hiding
Authors
1 SASTRA University, IN
Source
Indian Journal of Science and Technology, Vol 7, No 9 (2014), Pagination: 1403-1413Abstract
In image steganography, a number of data hiding schemes have been proposed and data has been hidden using them. Among these, the usage of mind-teasers and puzzles like Sudoku has also been used as schemes to hide data. In this paper, the territory of puzzle usage as data hiding scheme in image steganography is extended. A novel data hiding scheme based on Ken Ken puzzle is proposed. Though the Ken Ken puzzle is similar to the existing Sudoku technique of data hiding, the inherent difficulty involved in solving a Ken Ken puzzle is leveraged in this method and the final results after embedding data are then analyzed in terms of the visual quality of the stego-image obtained. This is done by means of certain quality metrics available to test the resulting image quality. The proposed system has been found to enhance the graphical quality of the resulting stego-image when compared to the existing system.Keywords
Data Hiding Scheme, Data Security, Image Steganography, Puzzle-based Steganography- Study on Data Storage Correctness Methods in Mobile Cloud Computing
Authors
1 Computer Science and Engineering, School of Computing, SASTRA University, Tirumalaisamudram, Thanjavur – 613401, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 6 (2015), Pagination: 495-500Abstract
Data Storage Correctness plays a major role in Mobile Cloud Computing. This deals with checking the integrity of data at remote cloud storage server. In auditing the data blindness should be incorporated regarding Third party auditing. Message Authentication Code, Digital Signatures, and Hash methods are employed for verification of message in the existing methods. In this current study data dynamic and public auditing is taken with confidentiality. This work isolates the method that is suitable for mobile cloud environment and gives the overall view of the auditing methods in the recent study. Design of an efficient auditing architecture to minimize computation and storage cost of the mobile devices are proposed to enhance the mobile users auditing is discussed. This work analysed on numerous existing cloud storage correctness methods pros and cons based on their technique, framework and also discusses the challenges that are required to implement data storage correctness method in Mobile Cloud Computing. This study gives a new framework to improve the integrity verification for remote data stored in cloud.Keywords
Auditing, Data Dynamics, Data Storage Correctness, Mobile Cloud, Provable Data Possession, Trusted Third Party.- A Novel Reversible Steganography Method using Dynamic Key Generation for Medical Images
Authors
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 16 (2015), Pagination:Abstract
Nowadays security of information became an important issue. So it is mandatory to preserve the security of data that need to be transmitted in telemedicine application for proper and cost effective diagnosis. Steganography plays an important role in telemedicine application by providing confidentiality and integrity. This paper proposes a steganography technique which hides patient information inside medical images using a key dynamically generated by graph3 coloring and pixel count of cover image. Steganography is done along with cryptography by encrypting the patient information using RSA algorithm to strengthen the level of security. This proposed method maintains reversibility that the original medical images can be losslessly restored after the extraction of data from stego medical image. Experimental results show that this novel method is more secure as compared to other information hiding methods against various parameters such as computational complexity in key generation by unauthorized person and quality measure of reversed image in terms of Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE).Keywords
Chromatic Polynomial, Dynamic Key, Graph Coloring, Hash Value, Region of Interest, Reversible Steganography- IC Protection from IP and IC Piracy using AES Logic Encryption
Authors
Source
Fuzzy Systems, Vol 8, No 6 (2016), Pagination: 161-164Abstract
Most of the IC’s are implemented by means of IP piracy and IC piracy. Usage of hardware intellectual property by the third party is known as IP piracy and manufacturing the IC without the knowledge of IC owner is known as IC piracy. The objective of this paper is to avoid this IP piracy and IC piracy. Various methods to avoid this IP and IC piracy are exist in the literature such as logic obfuscation, logic encryption, split manufacturing, IC Camouflaging, and Trojan Activation. This paper deals with the logic encryption method to avoid the IP and IC piracy. Logic encryption is done by means of introducing the key gates where one of the input given to the key gates is called as key input. In our proposed paper, AES encrypted key is given to the key circuit.
Keywords
IP Piracy, IC Piracy, AES, Encryption, Key- Enhancing Embedding Capacity and Security using Reversible Texture Synthesis in Image Steganography
Authors
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objectives: Image steganography embeds a secret data of any form on an image. It hides data into a digital media like image, audio and video. The message existence is made unknown by embedding it in a digital host before transmitting it. Secret communication can be achieved through cryptography and steganography. But steganography has few advantages over cryptography one such major advantage is that the encrypted text is hidden and cannot easily be disclosed. Methods: Steganogrphy technique involves cover object and stego object where Cover-object is the object in which message is embedded and Stego-object is the object that carries the hidden message. Texture synthesis is used in steganography where smaller texture image is resampled into new texture image with similar visual properties. Instead of using a cover image for hiding messages the proposed method involves concealing original texture of the image and embedding the secret messages. Findings: In Reversible texture synthesis the source texture can be recovered which is same as that of the original image therefore it can be reused further. In the proposed system Patch based texture synthesis is employed wherever the textures are synthesized by pasting the patches from original texture. Embedding capability and security will be increased without degrading image quality using Huffman cryptography. Applications: Steganography is mainly used for confidential and secret data sharing, protection against data alteration, control system access for digital distribution of contents, Steganography is also used for media database systemsKeywords
Huffman Coding, Patch Synthesis, Security, Steganography, Texture Synthesis.- Multi-Purpose Prototype for Theft, Monitoring and Online-Payment in EB Meter Using IOT
Authors
1 Department of Electronics and communication Engineering, Sri Eshwar College of Engineering, Coimbatore - 641107, IN
Source
Digital Signal Processing, Vol 11, No 3 (2019), Pagination: 55-57Abstract
Monitoring and keeping tracking of your electricity consumption for verification is a tedious task today since you need to go to meter reading room and take down readings. It is important to know if you are charged accordingly so the need is quite certain. Well we automate the system by allowing users to monitor energy meter readings over the internet. Our proposed system uses energy meter with microcontroller system to monitor energy usage using a meter. The meter is used to monitor units consumed and transmit the units as well as cost charged over the internet using Wi-Fi connection. This allows user to easily check the energy usage along with the cost charged online using a simple web application. Thus the energy meter monitoring system allows user to effectively monitor electricity meter readings and check the billing online with ease. Since IOT is cost effective compared to SMS, monitoring of energy meters at lower cost is made possible. The system is more reliable and accurate reading values are collected from energy meters. Also, the readings can be viewed online. The human intensive work is avoided and all the values are maintained in the central server. The users can be aware of their electricity consumption. The human work of collecting readings by visiting every home at the end of every month can be avoided by generating Electricity bills automatically. Theft of electricity can be avoided by tamper proof energy meters. The errors in the system can be identified quickly and incase of over usage than household lines, GSM module indicates the service station with a notification.
Keywords
IOT, Sensing System, Smart Power Meter, Energy Meter.References
- Maha Aboelmaged, Yasmeen Abdelghani, Mohamed A. Abd El Ghany, “Wireless IoT based Metering System for Energy Efficient Smart Cities”.
- Shalli Rani, et al. “A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks”. Sensors ISSN 1424-8220, vol. 15, pp. 8603-28626. November 2015.
- Shyamambika, N. and Thillaiarasu. N, 2016, January. A survey on acquiring integrity of shared data with effective user termination in the cloud. In Intelligent Systems and Control (ISCO), 2016 10th International Conference on (pp. 1-5). IEEE.
- Waleed Ejaz et al, “Efficient Energy Management for the Internet of Things in Smart Cities”. Published in Efficient Energy Management for the Internet of Things in Smart Cities, vol. 55, Issue 1, January 2017
- Jacques Benoit. “The Internet of Things and the energy sector: myth or opportunity”. Published in Power and Energy Automation Conference, Spokane, WA March 2016
- Dong Sik Kim, Sung-Yong Son and Jeongjoon Lee (2013), “Developments of the In-Home Display Systems for Residential Energy Monitoring”, IEEE Transactions on Consumer Electronics, Vol. 59 No. 3 pp. 492–498.