Author(s): Ms. Purnima, Lalitkumar P Bhaiya, Ghanshyam Sahu

Email(s): Email ID Not Available

DOI: 10.52711/2321-581X.2023.00004   

Address: Ms. Purnima1, Lalitkumar P Bhaiya2, Ghanshyam Sahu3
1M. Tech Scholar, Dept of CSE, Bharti College of Engineering & Technology, Durg.
2Assistant Professor, Dept of CSE, Bharti College of Engineering & Technology, Durg.
3Assistant Professor, Dept of CSE, Bharti College of Engineering & Technology, Durg.
*Corresponding Author

Published In:   Volume - 14,      Issue - 1,     Year - 2023


ABSTRACT:
We occasionally hear in the news about a breach or attack on certain well-known firms as though it were just another piece of news, but in reality, it is a serious problem because it involves the personal information of people, their money in trade, and the management of their businesses and projects. The honey encryption planner is going to be the topic of conversation for the duration of this essay. Honey Encryption is an encryption method that provides plain acceptable text in order to provide flexibility against brute-force attacks. Honey Encryption does this by encoding data in a way that is not easily broken. It is difficult to build a convincing message trap that is flawless enough to fool the striker even when he feels that he possesses the message in its original form. This is due to the fact that for each key that is used by a trespasser to decode a message, two key regions are open. The typo problem is the second difficulty, and it happens when a lawful user pushes the wrong key by accident. This causes the user to see what appears to be real false plain text even though the user did nothing wrong. Our goal is to come up with more foolproof ruses that are clever enough to prevent an intruder's attempts to discern the genuine meaning of what we are attempting to say through our communication. We also need new security methods because the attackers are looking for new ways to attack the systems, so we proposed a new way to protect messages and passwords well and make them difficult to break and take all of the possibilities of attack, including the brute-force, and then the data is hidden in an image with a public secret key. This solution was developed because the attackers are looking for new ways to attack the systems. This is due to the fact that the attackers are continuously searching for new ways to launch attacks on the systems.


Cite this article:
Ms. Purnima, Lalitkumar P Bhaiya, Ghanshyam Sahu. A Review on Reading of Text Hidden in Image Using Steganography. Research Journal of Engineering and Technology. 2023; 14(1):41-7. doi: 10.52711/2321-581X.2023.00004

Cite(Electronic):
Ms. Purnima, Lalitkumar P Bhaiya, Ghanshyam Sahu. A Review on Reading of Text Hidden in Image Using Steganography. Research Journal of Engineering and Technology. 2023; 14(1):41-7. doi: 10.52711/2321-581X.2023.00004   Available on: https://www.ijersonline.org/AbstractView.aspx?PID=2023-14-1-4


REFERENCES:
1.    Noorunnisa, N. S., and Afreen, D. K. R. (2016). Review on Honey Encryption Technique. International Journal of Science and Research (IJSR) ISSN (Online), 2319-7064.
2.    Juels, A., and Rivest, R. L. (2013, November). Honeywords: Making password-cracking detectable. In Proceedings of the 2013 ACM SIGSAC conference on Computer and communications security (pp. 145-160).
3.    Juels, A. (2014, June). A bodyguard of lies: the use of honey objects in information security. In Proceedings of the 19th ACM symposium on Access control models and technologies (pp. 1-4).
4.    Lindholm, R. (2019). Honey Encryption: implementation challenges and solutions.
5.    ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE transactions on information theory, 31(4), 469-472.
6.    Meier, A. V. (2005, June). The elgamal cryptosystem. In Joint Advanced Students Seminar.
7.    Oppliger, R. (2011). Contemporary cryptography. Artech House
8.    Taneski, V., Heriˇcko, M., and Brumen, B. (2014). Password security—No change in 35 years?In 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO) (pp. 1360–1365). IEEE. Retrieved from https://ieeexplore.ieee.org/document/6859779
9.    Abdalla, N. A. A. (2019). Preservation of Data Confidentiality Using Honey Encryption (Doctoral dissertation, Sudan University of Science and Technology).
10.    Juels, A., and Ristenpart, T. (2014, May). Honey encryption: Security beyond the brute-force bound. In Annual international conference on the theory and applications of cryptographic techniques (pp. 293-310). Springer, Berlin, Heidelberg.
11.    SAHU, S. (2020) Providing Information Security Using Honey Encryption.
12.    Omolara, A. E., Jantan, A., and Abiodun, O. I. (2019). A comprehensive review of honey encryption scheme. Indonesian Journal of Electrical Engineering and Computer Science, 13(2), 649-656.
13.    Bojinov, H., Bursztein, E., Boyen, X., and Boneh, D. (2010, September). Kamouflage: Loss-resistant password management. In European symposium on research in computer security (pp. 286-302). Springer, Berlin, Heidelberg.
14.    Yajun, G. U. O., and Dongqi, P. U. (2019). Privacy Data Protection Based on the Honey Encryption. Netinfo Security, 19(12), 38.
15.    Latha.K, Sheela.T (September 2019) . Reducing Cloud Data Breaches and Improving Data Security using Honey Encryption Algorithm. International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue-11S
16.    Rani, D. N. U., Ahmad, S. N., Reddy, C., and Lakshmi, P. J. (2018, February). Honey Maze Encryption (Home). In 2018 IADS International Conference on Computing, Communications and Data Engineering (CCODE).
17.    Noorunnisa, N. S., and Afreen, D. K. R. (2019). Honey Encryption based Password Manager. Journal of Emerging Technologies and Innovative Research (JETIR) ISSN: 2349-5162.
18.    Srinivasu, N., Sahil, M., Francis, J., and Pravallika, S. (2017). Security enhanced using honey encryption for private data sharing in cloud. International Journal of Engineering and Technology, 7(1.1), 675-678.
19.    Fun, T. S., Samsudin, A., and Zaaba, Z. F. (2017). Enhanced security for public cloud storage with honey encryption. Advanced Science Letters, 23(5), 4232-4235.
20.    Huang, Z., Ayday, E., Fellay, J., Hubaux, J. P., and Juels, A (2015, May). GenoGuard: Protecting genomic data against brute-force attacks. In 2015 IEEE Symposium on Security and Privacy (pp. 447-462). IEEE.
21.    Arun, S., and Shanker, N. R. (2006). Data Security In Cloud Storage Using Advanced Encryption Standard And Honey Cryptography.
22.    Srilatha Komakula, V.Shobha Rani (2020).Honey Encryption With Quantum Key Distribution. International Journal For Innovative Engineering and Management Research- IJIEMR (Vol 09 Issue01, Jan 2020 ISSN 2456 - 5083)
23.    Mok, E., Samsudin, A., and Tan, S. F. (2017). Implementing the honey encryption for securing public cloud data storage. In First EAI International Conference on Computer Science and Engineering (Vol. 10).
24.    Tan, S. F., and Samsudin, A. (2018). Enhanced security of internet banking authentication with extended honey encryption (XHE) scheme. In Innovative Computing, Optimization and Its Applications (pp. 201-216). Springer, Cham.
25.    Tyagi, N., Wang, J., Wen, K., and Zuo, D. (2015). Honey encryption applications. Network Security, 2015, 1-16.
26.    Rajalakshmi, M., and Parthasarathy, C. (2006). An Implementation Of Fhma For Honey Encrypted Datasets In Wireless Sensor Networks.
27.    A. Juels and T. Ristenpart, "Honey Encryption: Encryption beyond the Brute-Force Barrier," in IEEE Security and Privacy, vol. 12, no. 4, pp. 59-62, July-Aug. 2014, doi: 10.1109/MSP.2014.67.
28.    Jaeger, J., Ristenpart, T., and Tang, Q. (2016, May). Honey encryption beyond message recovery security. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 758-788). Springer, Berlin, Heidelberg.
29.    Menezes, A.J., van Oorschot, P.C., and Vanstone, S.A. (1997). Handbook of Applied Cryptography (1st ed.).CRC Press. https://doi.org/10.1201/9780429466335
30.    Dougherty, C. R. (2009). Vulnerability Note VU# 836068 MD5 vulnerable to collision attacks. Retrieved August, 26, 2009.].
31.    Sotirov, A., Stevens, M., Appelbaum, J., Lenstra, A. K., Molnar, D., Osvik, D. A., and de Weger, B. (2008). MD5 considered harmful today, creating a rogue CA certificate. In 25th Annual Chaos Communication Congress (No.CONF).
32.    Stevens, M., Bursztein, E., Karpman, P., Albertini, A., and Markov, Y. (2017, August). The first collision for full SHA-1. In Annual International Cryptology Conference (pp. 570-596). Springer, Cham.
33.    Devi, R., Sujatha, P. (2020). A Hybrid Watermarking System for Securing Multi-modal Biometric Using Honey Encryption and Grasshopper Optimization Technique. In Intelligent Computing and Innovation on Data Science (pp. 725-734). Springer, Singapore.
34.    Piyush, "Advanced Honey Encryption: An Escape-less Trap for Intruders," 2018 4th International Conference on Computing Communication and Automation (ICCCA), 2018, pp. 1-4, doi: 10.1109/CCAA.2018.8777468.
35.    Rajalakshmi, M., and Parthasarathy, C. (2006). An implementation of fhma for honey encrypted datasets in wireless sensor networks.
36.    Kapil, G., Agrawal, A., Attaallah, A., Algarni, A., Kumar, R., and Khan, R. A. (2020). Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective. PeerJ Computer Science, 6, e259.
37.    Ravindranadh, K., Kiran, M. S., Kumar, B. D. S. P., and Priyanka, D. (2018). Data migration in cloud computing using honey encryption. International Journal of Engineering and Technology, 7(2.8), 230-234.
38.    Panchal, K. (2020). Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme. arXiv preprint arXiv:2010.15985.
39.    Kurnaz, S., Mohammed, A. H. (2020, June). Secure Pin Authentication in Java Smart Card Using Honey Encryption. In 2020 International Congress on Human- Computer Interaction, Optimization and Robotic Applications (HORA) (pp. 1-4). IEEE.
40.    Abiodun, E. O., Jantan, A., Abiodun, O. I., and Arshad, H. (2020). Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp. Wireless Personal Communications, 112(4), 2533-2556.
41.    Huang, Z., Ayday, E., Fellay, J., Hubaux, J. P., and Juels, A. (2015, May). GenoGuard: Protecting genomic data against brute-force attacks. In 2015 IEEE Symposium on Security and Privacy (pp. 447-462). IEEE.
42.    Yin, W., Indulska, J., and Zhou, H. (2017). Protecting private data by honey encryption. Security and Communication Networks, 2017.
43.    Yin, W., Indulska, J., and Zhou, H. (2017). Protecting private data by honey encryption. Security and Communication Networks, 2017.
44.    Win, T., and Moe, K. S. M. Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm.
45.    Sawant, S., Saptal, P., Lokhande, K., Gadhave, K., and Kaur, R. (2018). Honeywords: Making Password Cracking Detectable. International Journal of Engineering Research and Advanced Technology-IJERAT (ISSN: 2454-6135), 4(4), 01-06
46.    Kelley, P. G., Komanduri, S., Mazurek, M. L., Shay, R., Vidas, T., Bauer, L., ... and Lopez, J. (2012, May). Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In 2012 IEEE symposium on security and privacy (pp. 523-537). IEEE.
47.    A. Czeskis, M. Dietz, T. Kohno, D. Wallach, and D. Balfanz. Strengthening user authentication through opportunistic cryptographic identity assertions. In ACM CCS, pages 404–414, 2012.
48.    O. Kharif. Innovator: Ramesh Kesanupalli’s biometric passwords stored on devices. Bloomberg Businessweek, 28 March 2013.
49.    T. Wadhwa. Why your next phone will include fingerprint, facial, and voice recognition. Forbes, 29 March 2013.
50.    Choi, H., Jeong, J., Woo, S. S., Kang, K., and Hur, J. (2019). Password typographical error resilience in honey encryption. Computers and Security, 87, 101411.
51.    Chatterjee, R., Bonneau, J., Juels, A., and Ristenpart, T. (2015, May). Cracking-resistant password vaults using natural language encoders. In 2015 IEEE Symposium on Security and Privacy (pp. 481-498). IEEE.
52.    Burgess, J. (2017). Honey Encryption Review. Queen's University Belfast.
53.    Chatterjee R, Athayle A, Akhawe D, Juels A, Ristenpart T. pASSWORD tYPOS and how to correct them securely. In Security and Privacy (SP), 2016 IEEE Symposium on 2016 May 22 (pp. 799-818). IEEE.
54.    Choi H, Nam H, Hur J. Password typos resilience in honey encryption. In Information Networking (ICOIN), 2017 International Conference on 2017 Jan 11 (pp. 593-598). IEEE.
55.    Chatterjee R, Woodage J, Pnueli Y, Chowdhury A, Ristenpart T. The TypTop System: Personalized Typo- tolerant Password Checking. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017: 329-346
56.    Huang, Z., Ayday, E., Fellay, J., Hubaux, J. P., and Juels, A. (2015, May). GenoGuard: Protecting genomic data against brute-force attacks. In 2015 IEEE Symposium on Security and Privacy (pp. 447-462). IEEE.
57.    Choi H, Nam H, Hur J. Password typos resilience in honey encryption. In Information Networking (ICOIN), 2017 International Conference on 2017 Jan 11 (pp. 593-598). IEEE.
58.    Al-Qwider, W. H., and Salameh, J. N. B. (2017). Novel technique for securing data communication systems by using cryptography and steganography Jordanian Journal of Computers and Information Technology (JJCIT), 3(2), 110-130.

Recomonded Articles:

Author(s): Jaspreet Kaur, Rajdeep Singh Sohal

DOI: 10.5958/2321-581X.2017.00009.5         Access: Open Access Read More

Author(s): Sheena Mohammed, Madhuri Dachepally, A Annapurna

DOI: 10.5958/2321-581X.2015.00063.X         Access: Open Access Read More

Author(s): Ms. Purnima, Lalitkumar P Bhaiya, Ghanshyam Sahu

DOI: 10.52711/2321-581X.2023.00004         Access: Open Access Read More

Research Journal of Engineering and Technology (RJET) is an international, peer-reviewed, research journal aiming at promoting and publishing original high quality research in all disciplines of engineering sciences and technology....... Read more >>>

RNI: Not Available                     
DOI: 10.5958/2321-581X 


Recent Articles




Tags