To Improve Data Security by Using Secure Data Transmission

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - December Issue 2013 by IJCTT Journal
Volume-6 Issue-5                           
Year of Publication : 2013
Authors :Manisha Yadav

MLA

Manisha Yadav"To Improve Data Security by Using Secure Data Transmission"International Journal of Computer Trends and Technology (IJCTT),V6(5):260-263 December Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- -The “Secure data transmission” is a software solution which provides security during transmission .Present day security is the main issue that the third person attacks on the data. To provide security Tiny Encsryption Algorithm (TEA) is used. TEA is used for encryption and decryption of data. Encryption plays a cordial role in security. Encryption alters the data in unreadable form. Encrypted file embed in a video file by using steganography. Steganography is the concealing of secrete data inside image, video, audio. That video file sends via an email .On the receiver end receiver receive the video file and decrypted it by using Tiny encryption Algorithm (TEA). Then de-embed the information by steganography .This is the process that we are discuss in the paper . The goal of our project is to design a tool for providing security to the system during transmission of data. The project is developed using graphics in java swings.

References:-

[1]. Andem, Vikram Reddy . “A Cryptanalysis of the Tiny Encryption Algorithm”, 2003
[2]. Atul Kahate, “ Cryptography and Network Security”, TMH, 2003
[3]. Behrouz A. Forouzan, (2006)“Cryptography and Network Security”, Firstedition, McGraw- Hill.
[4]. Christian Cachin.” An information-theoretic model for steganography”. Lecture Notes in Computer Science, 1525:306.318, 1998.
[5]. Hernández, Julio César; Isasi, Pedro; Ribagorda, Arturo. "An application of genetic algorithms to the cryptoanalysis of one round TEA". Proceedings of the 2002 Symposium on Artificial Intelligence and its Application, 2002.
[6]. Johnson N. and Jajodia S., “Steganography: Seeing the Unseen,” IEEE Computer Magazine, vol. 25, no. 4, pp. 26-34, 1998.
[7]. Kawaguchi, E; Eason RO . "Principle and applications Steganography (Original paper on Steganography)" sept 2008.
[8]. Luis von Ahn and Nicholas J. Hopper. “Public-key steganography” In Lecture Notes in Computer Science, volume 3027,1995.
[9]. Popa R., “An Analysis of Steganographic Techniques,” Working Report on Steganography, Faculty of Automatics and Computers, 1998.
[10]. R. Anderson, R. Needham, and A. Shamir. “The steganographic file system”. In IWIH: International Workshop on Information Hiding, 1998.
[11]. ?Video Steganography by LSB Substitution Using Different Polynomial Equations?, A. Swathi, Dr. S.A.K Jilani, International Journal of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5
[12]. An overview of image steganography?, T Morkel, J.H.P. Eloff, M.S.Olivier.
[13]. Wheeler, D.J., & Needham, R.J. “ TEA, a tiny encryption algorithm”. In Fast Software Encryption – Proceedings of the 2nd International Workshop,1008, 1998

Keywords:-Steganography, Tiny Encryption Algorithm, Encryption, Decryption ,Embed ,De-embed.