DIGITAL DATA PROTECTION USING STEGANOGRAPHY

In today’s digital world applications from a computer or a mobile device consistently used to get every kind of work done for professional as well as entertainment purpose. However, one of the major issue that a software publisher will face is the issue of piracy. Throughout the last couple of decad...

Full description

Bibliographic Details
Main Authors: R. Rejani, D. Murugan, Deepu V. Krishnan
Format: Article
Language:English
Published: ICT Academy of Tamil Nadu 2016-03-01
Series:ICTACT Journal on Communication Technology
Subjects:
AES
LSB
Online Access:http://ictactjournals.in/paper/IJCT_V7_I1_paper4_1245_1254.pdf
id doaj-2f9b5ff866dd43478a4ace9fb0055a25
record_format Article
spelling doaj-2f9b5ff866dd43478a4ace9fb0055a252020-11-24T22:11:39ZengICT Academy of Tamil NaduICTACT Journal on Communication Technology0976-00912229-69482016-03-017112451254DIGITAL DATA PROTECTION USING STEGANOGRAPHYR. Rejani0D. Murugan1Deepu V. Krishnan2Manonmanium Sundaranar University, IndiaManonmanium Sundaranar University, Indianfosys Limited, Technopark Campus, Trivandrum, IndiaIn today’s digital world applications from a computer or a mobile device consistently used to get every kind of work done for professional as well as entertainment purpose. However, one of the major issue that a software publisher will face is the issue of piracy. Throughout the last couple of decades, almost all-major or minor software has been pirated and freely circulated across the internet. The impact of the rampant software piracy has been huge and runs into billions of dollars every year. For an independent developer or a programmer, the impact of piracy will be huge. Huge companies that make specialized software often employ complex hardware methods such as usage of dongles to avoid software piracy. However, this is not possible to do for a normal independent programmer of a small company. As part of the research, a new method of software protection that does not need proprietary hardware and other complex methods are proposed in this paper. This method uses a combination of inbuilt hardware features as well as steganography and encryption to protect the software against piracy. The properties or methods used include uniqueness of hardware, steganography, strong encryption like AES and geographic location. To avoid hacking the proposed framework also makes use of self-checks in a random manner. The process is quite simple to implement for any developer and is usable on both traditional PCs as well as mobile environments.http://ictactjournals.in/paper/IJCT_V7_I1_paper4_1245_1254.pdfData protectionSteganographyStego ImageCover ImageSoftware ProtectionEncipherAESSteganoDBLSB
collection DOAJ
language English
format Article
sources DOAJ
author R. Rejani
D. Murugan
Deepu V. Krishnan
spellingShingle R. Rejani
D. Murugan
Deepu V. Krishnan
DIGITAL DATA PROTECTION USING STEGANOGRAPHY
ICTACT Journal on Communication Technology
Data protection
Steganography
Stego Image
Cover Image
Software Protection
Encipher
AES
SteganoDB
LSB
author_facet R. Rejani
D. Murugan
Deepu V. Krishnan
author_sort R. Rejani
title DIGITAL DATA PROTECTION USING STEGANOGRAPHY
title_short DIGITAL DATA PROTECTION USING STEGANOGRAPHY
title_full DIGITAL DATA PROTECTION USING STEGANOGRAPHY
title_fullStr DIGITAL DATA PROTECTION USING STEGANOGRAPHY
title_full_unstemmed DIGITAL DATA PROTECTION USING STEGANOGRAPHY
title_sort digital data protection using steganography
publisher ICT Academy of Tamil Nadu
series ICTACT Journal on Communication Technology
issn 0976-0091
2229-6948
publishDate 2016-03-01
description In today’s digital world applications from a computer or a mobile device consistently used to get every kind of work done for professional as well as entertainment purpose. However, one of the major issue that a software publisher will face is the issue of piracy. Throughout the last couple of decades, almost all-major or minor software has been pirated and freely circulated across the internet. The impact of the rampant software piracy has been huge and runs into billions of dollars every year. For an independent developer or a programmer, the impact of piracy will be huge. Huge companies that make specialized software often employ complex hardware methods such as usage of dongles to avoid software piracy. However, this is not possible to do for a normal independent programmer of a small company. As part of the research, a new method of software protection that does not need proprietary hardware and other complex methods are proposed in this paper. This method uses a combination of inbuilt hardware features as well as steganography and encryption to protect the software against piracy. The properties or methods used include uniqueness of hardware, steganography, strong encryption like AES and geographic location. To avoid hacking the proposed framework also makes use of self-checks in a random manner. The process is quite simple to implement for any developer and is usable on both traditional PCs as well as mobile environments.
topic Data protection
Steganography
Stego Image
Cover Image
Software Protection
Encipher
AES
SteganoDB
LSB
url http://ictactjournals.in/paper/IJCT_V7_I1_paper4_1245_1254.pdf
work_keys_str_mv AT rrejani digitaldataprotectionusingsteganography
AT dmurugan digitaldataprotectionusingsteganography
AT deepuvkrishnan digitaldataprotectionusingsteganography
_version_ 1725804741450006528