07-06-2013, 04:54 PM
DATA SECURITY - Securing Data Transmission Over Networks
DATA SECURITY.doc (Size: 682.5 KB / Downloads: 25)
ABSTRACT
Today in the widespread computer world the security of the data plays a vital role. Computer security is a process of preventing and protecting unauthorized use of your computer. Data security measures are needed to protect data during transmission. To provide such security, the techniques are CRYPTOGRAPHY and STEGNOGRAPHY. Commonly used technology is cryptography. But most of the best use is implementing security-using steganography.Not only these techniques but by using multi layered techniques we can provide more security.
In this technology, the end user identifies an image which is going to act as the carrier of data. The data file is also selected and then to achieve greater speed of transmission the data file and image file are compressed and sent. Prior to this the data is embedded into the image and then sent. The image if hacked or interpreted by a third party user will open up in any image previewer but not displaying the data. This protects the data from being invisible and hence be secure during transmission. The user in the receiving end uses another piece of code to retrieve the data from the image
Steganography is the art and science of hiding that communication is happening. Classical steganography systems depend on keeping the encoding system secret, but modern steganography is detectable only if secret information is known, e.g. a secret key. Because of their invasive nature, steganography systems leave detectable traces within a medium's characteristics. This allows an eavesdropper to detect media that has been modified, revealing that secret communication is taking place. Although the secrecy of the information is not degraded, its hidden nature is revealed, defeating the main purpose of Steganography. For JPEG images, Outguess preserves statistics based on frequency counts. As a result, statistical tests based on frequency counts are unable to detect the presence of steganographic content. Before embedding data into an image, Outguess can determine the maximum message size that can be hidden while still being able to maintain statistics based on frequency counts.
INTRODUCTION
The system deals with security during transmission of data. Commonly used technologies are cryptography. This system deals with implementing security using steganography. In this end user identifies an image which is going to act as the carrier of data. The data file is also selected and then to achieve greater speed of transmission the data file and image file are compressed and sent. Prior to this the data is embedded into the image and then sent. The image if hacked or interpreted by a third party user will open up in any image previewer but not displaying the data. This protects the data from being invisible and hence be secure during transmission. The user in the receiving end uses another piece of code to retrieve the data from the image.
CRYPTOGRAPHY
Cryptography is the science of writing in secret code and is an ancient art Cryptography has a long and colorful history. It can reformat and transform your data, making it safer on its trip between computers. Cryptography is not only the means of providing information security, but rather one set of techniques. Crypto techniques give the right balance of communication capabilities and security protection. Cryptography allows people to carry over the confidence found in the physical world to the electronic world. In data and telecommunications, cryptography is necessary when communicating over any non trusted medium.
STEGANOGRAPHY
"Steganography is the art and science of communicating in a way which hides the existence of the communication. In contrast to Cryptography, where the enemy is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of Steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second message present".
In a digital world, Steganography and Cryptography are both intended to protect information from unwanted parties. Both Steganography and Cryptography are excellent means by which to accomplish this but neither technology alone is perfect and both can be broken. It is for this reason that most experts would suggest using both to add multiple layers of security.
Steganography can be used in a large amount of data formats in the digital world of today. The most popular data formats used are .bmp, .doc, .gif, .jpeg, .mp3, .txt and .wav.
Mainly because of their popularity on the Internet and the ease of use of the steganographic tools that use these data formats. These formats are also popular because of the relative ease by which redundant or noisy data can be removed from them and replaced with a hidden message.
Steganographic technologies are a very important part of the future of Internet security and privacy on open systems such as the Internet. Steganographic research is primarily driven by the lack of strength in the cryptographic systems on their own and the desire to have complete secrecy in open-systems environment. This menu consists of the following submenu content.