Confidential Log-In To Real User using Visual Cryptography and Upload Encrypted Data on Database Sys

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 03 | Mar -2017

p-ISSN: 2395-0072

www.irjet.net

Confidential log-in to real user using Visual Cryptography and upload encrypted data on Database System using Steganography Shah Shrenik1, Shetyanavar Shubham2,Waghmare Manoj 3,Gandhi Saurabh4 Department of Computer Engineering AISSMS College of Engineering Shivajinagar, Pune 01 Guide: Professor A.S. Deokar

---------------------------------------------------------------------***--------------------------------------------------------------------information hiding procedure. In an ideal situation, the Abstract - Data is an important asset for any individual existence of hidden communication cannot be detected or organization and must be protected from intruders or by third parties. hackers. The need to hide data from hackers has existed What distinguishes historical steganographic since ancient times, and nowadays, there are methods from the modern ones is, in fact, only the form developments in digital media, such as audio, video, of the cover (carrier) for secret data. Historical images, and so on. To secure secret information, different methods relied on physical Steganography the media methods are used and steganography is one. This employed media were: human skin, game, etc. Further project presents video steganography with digital advances in hiding communication based on the use of watermarking algorithms as an efficient and robust way more complex covers, e.g. with the aid of ordinary for protection. This paper is a combination of objects, whose orientation was assigned meaning. This Cryptography, Steganography and watermarking is how semagrams were introduced. The algorithms which provides a strong backbone for its popularization of the written word and the increasing security and hiding data in different multimedia files. literacy among people had brought about methods This proposed system not only hides data but also limits which utilized text as carrier. The World Wars had the perceivable distortion that might occur while accelerated the development of Steganography by processing it. introducing a new carrier the electromagnetic waves. Database security is provided by using image Presently, the most popular carriers include digital CAPTCHA created using Visual Cryptography algorithm. images, audio and video files and communication The data is store in database using steganography and protocols. The latter may apply to network protocols as watermarking algorithms behind the multimedia files. well as any other communication protocol (e.g. The proposed System provides the Confidential Login to cryptographic). user using Visual Cryptography and upload encrypted The way that people communicate evolved over data, Data System using base Steganography. It has the ages and so did steganographic methods. At the same objective to hide data in video and provide security to time, the general principles remained unchanged. the same. Our methodology is based on Image CAPTCHA validation scheme using visual cryptography. Visual Cryptography is use to preserve the privacy of image 1.2 Problem Statement CAPTCHA. Key Words: SCD,LSB,CaGP,AWT. 1.Introduction Steganographic techniques have been used for ages and they date back to ancient Greece. The aim of steganographic communication back then and now, in modern applications, is the same: to hide secret data (a steganogram) in an innocently looking cover and send it to the proper recipient who is aware of the Š 2017, IRJET

|

Impact Factor value: 5.181

|

Globalization has led to the rapid growth of the Internet through which consumers can send and receive large amounts of data (e.g., text, audio, video, and images). In modern communication systems, securing data is of utmost importance. Yet sending and receiving secret files over the Internet is still insecure, and therefore hiding data in an effective way protects this secret information. Data is important to any organization. They must be protected from the ISO 9001:2008 Certified Journal

|

Page 1991


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.