DIGITAL DATA PROTECTION USING STEGANOGRAPHY
In today’s digital world applications from a computer or a mobile device consistently used to get every kind of work done for professional as well as entertainment purpose. However, one of the major issue that a software publisher will face is the issue of piracy. Throughout the last couple of decad...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
ICT Academy of Tamil Nadu
2016-03-01
|
Series: | ICTACT Journal on Communication Technology |
Subjects: | |
Online Access: | http://ictactjournals.in/paper/IJCT_V7_I1_paper4_1245_1254.pdf |
id |
doaj-2f9b5ff866dd43478a4ace9fb0055a25 |
---|---|
record_format |
Article |
spelling |
doaj-2f9b5ff866dd43478a4ace9fb0055a252020-11-24T22:11:39ZengICT Academy of Tamil NaduICTACT Journal on Communication Technology0976-00912229-69482016-03-017112451254DIGITAL DATA PROTECTION USING STEGANOGRAPHYR. Rejani0D. Murugan1Deepu V. Krishnan2Manonmanium Sundaranar University, IndiaManonmanium Sundaranar University, Indianfosys Limited, Technopark Campus, Trivandrum, IndiaIn today’s digital world applications from a computer or a mobile device consistently used to get every kind of work done for professional as well as entertainment purpose. However, one of the major issue that a software publisher will face is the issue of piracy. Throughout the last couple of decades, almost all-major or minor software has been pirated and freely circulated across the internet. The impact of the rampant software piracy has been huge and runs into billions of dollars every year. For an independent developer or a programmer, the impact of piracy will be huge. Huge companies that make specialized software often employ complex hardware methods such as usage of dongles to avoid software piracy. However, this is not possible to do for a normal independent programmer of a small company. As part of the research, a new method of software protection that does not need proprietary hardware and other complex methods are proposed in this paper. This method uses a combination of inbuilt hardware features as well as steganography and encryption to protect the software against piracy. The properties or methods used include uniqueness of hardware, steganography, strong encryption like AES and geographic location. To avoid hacking the proposed framework also makes use of self-checks in a random manner. The process is quite simple to implement for any developer and is usable on both traditional PCs as well as mobile environments.http://ictactjournals.in/paper/IJCT_V7_I1_paper4_1245_1254.pdfData protectionSteganographyStego ImageCover ImageSoftware ProtectionEncipherAESSteganoDBLSB |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
R. Rejani D. Murugan Deepu V. Krishnan |
spellingShingle |
R. Rejani D. Murugan Deepu V. Krishnan DIGITAL DATA PROTECTION USING STEGANOGRAPHY ICTACT Journal on Communication Technology Data protection Steganography Stego Image Cover Image Software Protection Encipher AES SteganoDB LSB |
author_facet |
R. Rejani D. Murugan Deepu V. Krishnan |
author_sort |
R. Rejani |
title |
DIGITAL DATA PROTECTION USING STEGANOGRAPHY |
title_short |
DIGITAL DATA PROTECTION USING STEGANOGRAPHY |
title_full |
DIGITAL DATA PROTECTION USING STEGANOGRAPHY |
title_fullStr |
DIGITAL DATA PROTECTION USING STEGANOGRAPHY |
title_full_unstemmed |
DIGITAL DATA PROTECTION USING STEGANOGRAPHY |
title_sort |
digital data protection using steganography |
publisher |
ICT Academy of Tamil Nadu |
series |
ICTACT Journal on Communication Technology |
issn |
0976-0091 2229-6948 |
publishDate |
2016-03-01 |
description |
In today’s digital world applications from a computer or a mobile device consistently used to get every kind of work done for professional as well as entertainment purpose. However, one of the major issue that a software publisher will face is the issue of piracy. Throughout the last couple of decades, almost all-major or minor software has been pirated and freely circulated across the internet. The impact of the rampant software piracy has been huge and runs into billions of dollars every year. For an independent developer or a programmer, the impact of piracy will be huge. Huge companies that make specialized software often employ complex hardware methods such as usage of dongles to avoid software piracy. However, this is not possible to do for a normal independent programmer of a small company. As part of the research, a new method of software protection that does not need proprietary hardware and other complex methods are proposed in this paper. This method uses a combination of inbuilt hardware features as well as steganography and encryption to protect the software against piracy. The properties or methods used include uniqueness of hardware, steganography, strong encryption like AES and geographic location. To avoid hacking the proposed framework also makes use of self-checks in a random manner. The process is quite simple to implement for any developer and is usable on both traditional PCs as well as mobile environments. |
topic |
Data protection Steganography Stego Image Cover Image Software Protection Encipher AES SteganoDB LSB |
url |
http://ictactjournals.in/paper/IJCT_V7_I1_paper4_1245_1254.pdf |
work_keys_str_mv |
AT rrejani digitaldataprotectionusingsteganography AT dmurugan digitaldataprotectionusingsteganography AT deepuvkrishnan digitaldataprotectionusingsteganography |
_version_ |
1725804741450006528 |