International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 04 | Apr -2017
p-ISSN: 2395-0072
www.irjet.net
Secure Data Transmission Prateek Kumar Singh1, Pratikshit Tripathi2, Rohit Kumar3, Deepak Kumar4 1UG
Scholar, Dept. of IT, GCET, Greater Noida, UP, India Scholar, Dept. of IT, GCET, Greater Noida, UP, India 3UG Scholar, Dept. of IT, GCET, Greater Noida, UP, India 4Assistant Professor, Dept. of IT, GCET, Greater Noida, UP, India 2UG
----------------------------------------------------------------------***-------------------------------------------------------------------(DES) and Blowfish. Our next level of security will be the Abstract - In the present scenario, any type of
steganography using audio, video and image [2]. In steganography, we will be using LSB algorithm for embedding the encrypted data file into the audio/image/video frames. After this multilevel encryption and embedding, we will transmit it through the secure communication channel to the opposite end.
communication over the internet and other network applications need to be secure due to their increasing utility. For this task, lots of algorithms for security have been implemented and used so far. With these developments, attackers have also come up with the new ideas to penetrate the communication mediums. Till now cryptography has been the mainstay for defending the secure data transmission [1]. With the increasing threat, Steganography has also taken space for security purpose. In cryptography, we change the natural form of data by using different security algorithms, which leads to increasing security of the communication process. In Steganography information is kept hidden from the attacker for communicating the information safely with the use of images, audios, videos etc. So for more security during data transmission, we have proposed the method of using both the techniques cryptography, and steganography. In cryptography we will perform three level encryption with the use of AES, DES and Blowfish algorithms. In steganography, we will be embedding the data file in any audio, video or image with the use of LSB, DWT and DCT technique and then we will communicate the secure data to the receiver end.
1.1 Motivation In cryptography, the reason of selecting the AES algorithm is that it is the highly defendable algorithm for encryption till now. We are using a 128-bit key and it goes through 10 rounds to complete the encryption [3]. For giving a perfect shot we have used blowfish algorithm also as Blowfish is the strongest and fastest in data processing and storing in comparison to other algorithms. We got the thought of using steganography to distract the attention of the attacker because when the attacker will be desperately in the search of any text file or doc file we can silently slip of audio or video file embedded with the secret document. In this manner, we can complete our task of transmission of data securely.
Key Words: Cryptography, Steganography, DWT Steganography, DCT Steganography, LSB Steganography, AES Encryption Standard, DES Encryption Standard, Blowfish Algorithm.
1.2 Objective The objective of our proposed work is to find an alternative to the problem faced by the different organization, companies and people for transmitting their critical and important data. In the earlier days, when we encrypted our data with an encryption with a single algorithm it was considered as a big invention for security but with the increasing use of internet, attackers have become aware of the methodology to take on these security algorithms. So for effectively countering it, there are multiple methods: a) To develop new security algorithms at regular intervals to avoid the formation of any pattern or similarity in the secured data. b) To apply multi-fold security using already present security algorithms like AES, DES Blowfish. c) To use different security approaches together like cryptography and steganography.
1. INTRODUCTION Nowadays communication has become the most desired requirement for each and every one and for this desire, we need a channel through which the information can be passed upon due to the growing importance of the communication channel it becomes vulnerable to a large variety of attacks. Our main task is to defend the transmission passage against all sort of attacks and transmit our information safely to the receiver. For this purpose, we are using cryptography. Generally in cryptography people encrypt the message with any encryption algorithm but in the wake of increasing attacks on data we will be implementing three algorithms for algorithms to make our data defendable against cyberattacks. The algorithms we will be using are Advanced Encryption Standard (AES)-128, Data Encryption Standard
Š 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
| Page 217