CFP last date
22 April 2024
Reseach Article

Multilevel Security and its Application to Enhance Data Protection

by Arush Kamboj, Ravi Bisla, N. Naveen Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Number 13
Year of Publication: 2014
Authors: Arush Kamboj, Ravi Bisla, N. Naveen Kumar
10.5120/16656-6635

Arush Kamboj, Ravi Bisla, N. Naveen Kumar . Multilevel Security and its Application to Enhance Data Protection. International Journal of Computer Applications. 95, 13 ( June 2014), 32-33. DOI=10.5120/16656-6635

@article{ 10.5120/16656-6635,
author = { Arush Kamboj, Ravi Bisla, N. Naveen Kumar },
title = { Multilevel Security and its Application to Enhance Data Protection },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 95 },
number = { 13 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 32-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume95/number13/16656-6635/ },
doi = { 10.5120/16656-6635 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:19:23.336596+05:30
%A Arush Kamboj
%A Ravi Bisla
%A N. Naveen Kumar
%T Multilevel Security and its Application to Enhance Data Protection
%J International Journal of Computer Applications
%@ 0975-8887
%V 95
%N 13
%P 32-33
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A vast amount of information available on the internet along with the increased use of internet as a communication medium served a great deal in making the information available vulnerable. The number as well as the technique of attacks has become more and more sophisticated with time. This paper focuses on developing a multilevel security system (layers of cryptography combined with steganography) in order to achieve maximum security. The level of security is maximized by encrypting the information at different level and then using steganographic techniques to hide the information (be it a text or a multimedia file) inside multimedia file such as image, an audio file or a video file. The bits of a file are manipulated at each level. The change in the quality as well as size of the file is minimized by carefully choosing the unused area of the file or the least significant one. The paper explains this multilayered system by hiding an encrypted image, which further contains an encrypted text message, inside a video.

References
  1. Philip Bateman "Image steganography and steganalysis" (2008 August)
  2. Vandana Thakur and Monjul Saikia, "Hiding Secret Image in Video" IEEE Internet Computing, Vol. 9,
  3. Vipula Madhukar Wajgade and Dr. Suresh Kumar, "Enhancing Data Security using Video Steganography," IJETAE, Volume 3, Issue 4, April 2013
  4. B. Dunbar. A Detailed look at steganographic techniques and their use in an Open-Systems Environment,Sans Institute,1(2002).
  5. Sanket Upadhyay, Priyanka pimpale and Rohan Rayarikar, "SMS Encryption using AES algorithm on Android", IJCA(0975 – 8887)Volume 50– No. 19, July 2012
  6. Hiding Image in an Image using LSB Method by Deepesh Rawat and Vijaya Bhandari, International Journal of Computer Applications (0975 – 8887) Volume 64– No. 20, February 2013
  7. Dct Based Image Steganographic Approach by Sonawane Viraj, Mali Jagdish and Prof. R. N Awale Vol. 3, Issue 4, Jul-Agu 2013, pp. 381-384
  8. L. Y. POR, B. Delina "Information Hiding: A New Approach in Text Steganography" 7th WSEAS Int. Conf.
  9. Monika Aggarwal "Text steganographic approaches: A comparison" , IJNSA, Vol. 5. No. 1, January 2013
  10. Arup Kumar Bhaumik, Minkyu Choi, Rosslin J. Robles and Maricel O. Balitanas "Data hiding in a video" IJDTA Vol 2, No. 2 June 2009
  11. A. Swathi, Dr. S. A. K Jilani, Ph. D " Video Steganography by LSB Substitution Using Different Polynomial Equations" IJCER Vol 5 Issue 5
  12. Mrs. Kavitha, Kavita Kadam, Ashwini Koshti, Priya Dunghav "Steganography Using LSB" IJERA Vol. 2, Issue 3, May-Jun 2012, pp. 338-341
  13. Shailender Gupta, Ankur Goyal, Bharat Bhushan "Information Hiding using LSB Steganography and Cryptography"
  14. http://binary-universe. net/index. php?article=3&language=e and article=3
  15. http://stackoverflow. com/questions/3018086/simple-basic-steganography-algorithms-and-methods
  16. http://www. nbcnews. com/tech/security/internet-speeds-are-rising-sharply-so-are-hack-attacks-n87616
  17. http://scien. stanford. edu/pages/labsite/2005/psych221/projects/05/vvikram/stego. htm
  18. http://www. citi. umich. edu/u/provos/papers/practical. pdf
  19. http://citeseerx. ist. psu. edu/viewdoc/download?rep=rep1&type=pdf&doi=10. 1. 1. 208. 5195
Index Terms

Computer Science
Information Sciences

Keywords

AES LSB DES