Latest

whatsapp (+234)07060722008
email sales@graciousnaija.com

Wednesday, 13 December 2017

ENHANCED DATA SECURITY ALGORITHM USING MODIFIED IMAGE RANDOMIZED LEAST SIGNIFICANT BIT AND EXCLUSIVE-OR ENCRYPTION

MSC Project Topics in Computer Science 

ABSTRACT
Security of data over unsecured channel is a global issue. Image steganography and Exclusive-OR (XOR) encryption are techniques employed to ensure data security. This dissertation develops and implements an algorithm that further improves the traditional image Least Significant Bit algorithm. Encryption of secret message was performed using 64 bits key and plaintext to obtain a cipher text. Each bits of the cipher text were hidden randomly using specific condition in red and blue planes of a selected cover 24 bits colour image. Extraction of the embedded cipher text was done as well as decryption of cipher text back to plain text. Experimental results showed that the proposed algorithm hides significant amount of data and extract it successfully without any loss at a very good Peak Signal to Noise Ratio (PNSR) of above 60dB. The statistical analysis of cover and stego image showed no much difference which further proved the proposed technique is more secured and efficient for private communication. Steganalytic result showed that the algorithm survives steganalysis test. Based on these results, the algorithm out performs other algorithm considered in the study.

CHAPTER ONE 
INTRODUCTION
1.1 Background of the Study
Humans have continually sought for new and efficient means of communicating sensitive information through the web and other communication channels. Seberry and Pierprzyk (1989) explained that “Security of information results from the need for private transmission of both military and diplomatic messages. This need is as old as civilization itself”. Advancements in technology introduced written language, telegraph, radio/television, and most recently electronic mail, telephone, social media chat, and communicating privately through these media is not without security challenges. Data transmission through Internet has been the fastest, simple and most used means of communication. However, the use of Internet poses serious threat on the security of such data. Therefore it becomes imperative to consider data security as it is one of the most important factor during data transmission process. Data security basically means the protection of data from unauthorized users or hackers and provision of high security against data modification. This area of study is growing in astronomical rate due to the growing number of Internet users globally. Data security has five main requirements to satisfy: confidentiality, data integrity, non repudiation, availability and authentication (Stallings, 2011).
Cryptography and steganography are two powerful techniques employed in data security. Steganography is the art and science of communicating in a way which hides the existence of the communication (Narayana and Prasad, 2010). The idea of modern steganography was first described in Simmons (1983) while describing communication between two prisoners. Cryptography is the study of encryption principles/methods. The process of converting from plaintext to ciphertext is known as enciphering or encryption; restoring the plaintext from the ciphertext is deciphering or decryption (Stallings, 2011).
The general objective of encryption is not to protect communications as such but rather the content (Becket, 1988). This is due to it being extremely difficult to stop communication interceptions. By using encryption, even if there is a transmission interception, the content of the communication is kept secret. This is extremely important in communication channels such as the Internet where many networks are connected together using broadcast mediums (such as Ethernet) and so data interception is real and active problem. Cryptographic techniques could be vulnerable due to improvement in the computers‟ capabilities in terms of speed of processing. However, this vulnerability can be significantly curbed by combining it with steganography. Steganography can be thought of as a higher version of cryptography and hence its usage can further increase the integrity and security of data. Traditionally in steganography, the goal is to hide a secret message, which is transmitted between two or more communication partners in a way to ensure confidentiality and integrity of data. Successful embedding depends on the selection of the cover image and the method involved. It is also important to note that steganographic technique not only involves in embedding information inside digital media but also the ability to successfully retrieve the information from the media.

1.2 Problem Statement

There are many conventional approaches to image least significant bit (LSB) steganography algorithms to guarantee secure data communication constraints but none is absolutely ideal. Each steganography algorithm has its own strength and weakness in terms of security and complexity. Some algorithm cannot retrieve hidden bits without loss of some part of it. The work therefore seeks to modify existing LSB algorithm and combine cryptography for the security of embedded data while maintaining high imperceptibility of the cover media with no loss of data during extraction process.

MSC Project Topics and Complete Thesis in Computer Science

ENHANCED DATA SECURITY ALGORITHM USING MODIFIED IMAGE RANDOMIZED LEAST SIGNIFICANT BIT AND EXCLUSIVE-OR ENCRYPTION

Department: Computer Science (M.Sc)
Format: MS Word
Chapters: 1 - 5, Preliminary Pages, Abstract, References, Appendix.
No. of Pages: 90

NB: The Complete Thesis is well written and ready to use. 

Price: 20,000 NGN
In Stock



No comments:

Post a Comment

Add Comment