Advertisement

Review of Digital Data Protection Using the Traditional Methods, Steganography and Cryptography

  • Chinmaya M. DharmadhikariEmail author
  • Rejo Mathew
Conference paper
  • 36 Downloads
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 49)

Abstract

The following paper reviews software protection methods by using the methods of steganography, cryptography to safeguard the running applications on pc as well as mobile applications. The software applications these days gets most of the work done for professional use as well as other purposes. The major issues faced by the software developer or publisher are of software piracy. All the major software these days are circulated and pirated through the internet. Thus using steganography and other techniques the goal is to solve the problem of software piracy. The solutions for protecting software from getting pirated are stated in this paper.

Keywords

Steganography Data protection Stego image Software developer JSON HDD MAC address Database LSB (least significant bit) Ciphertext StegoDB XOR Blowfish Edge detection 

References (IEEE format)

  1. 1.
    Rajani, R., Murugan, D., Krishnan, D.: Software protection framework using Steganography, Unique features of hardware and self-checking features. J. Adv. Inf. Technol. 25, 32–40Google Scholar
  2. 2.
    Anckaert, B., De Sutter, B., De Bosschere, K.: Software Piracy protection. In: Proceedings of the 4th ACM Workshop on Digital Rights Management, pp. 62–70 (2004)Google Scholar
  3. 3.
    Anderson, R.J., Petitcolas, F.A.: On the limits of steganography. IEEE Journal of Selected Areas in Communications 16(4), 474–481 (1998). Special Issue on Copyright and Privacy ProtectionCrossRefGoogle Scholar
  4. 4.
    Hasoon, N.H., Ali, R.A., Abed, H.N., Alkharaji, A.A.J.: Multilevel hiding text security using hybrid technique steganography and cryptography. Int. J. Eng. Technol. 7(4), 3674–3677 (2018)Google Scholar
  5. 5.
    Cachin, C.: An Information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, p. 306. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  6. 6.
    Laskar, S.A., Hemachandra, K.: Secure data transmission using steganography and encryption technique. Int. J. Comput. Secur. 4(2), 161–172 (2012)Google Scholar
  7. 7.
    Farid, H., Lyu, S.: Detecting hidden messages using higher-order statistics and support vector machines. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 340–354 (2002)Google Scholar
  8. 8.
    El-Khamy, S.E., Korany, N.O., El-Sherif, M.H.: Correlation: highly secure image hiding in audio signals using wavelet decomposition and chaotic maps hopping for multimedia communications. In: General Assembly and Scientific Symposium of the International Union of Radio Science (URSI GASS), pp. 1–3 (2017)Google Scholar
  9. 9.
    Gautam, R.R., Khare, R.K.: Real time image security for mobile communication using image steganography. Int. J. Eng. Res. Technol. 1(8), 1–5 (2012)Google Scholar
  10. 10.
    Kojima, T., Mayuzumi, R.: An improvement of the data hiding scheme based on complete complementary codesIn. In: Seventh International Workshop on Signal Design and its Applications in Communications, pp. 85–89 (2015)Google Scholar
  11. 11.
    Kaur, S., Bansal, S., Bansal, R.K.: Steganography and classification of image steganography techniques. In: International Conference on Computing for Sustainable Global Development, pp. 870–875 (2014)Google Scholar
  12. 12.
    Pant, V.K., Saurabh, A.: Cloud security issues, challenges and their optimal solutions. Int. J. Eng. Res. Manag. Technol. 2(3), 41–50 (2015). ISSN:2348–4039Google Scholar
  13. 13.
    Praveena, A., Smys, S.: Efficient cryptographic approach for data security in wireless sensor networks using MES VU. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1–6. IEEE (2016)Google Scholar
  14. 14.
    Kale, K.V., Aldawla, N.N.H., Kazi, M.M.: Steganography enhancement by combining text and image through wavelet technique. Int. J. Comput. Appl. (IJCA) 51(21), 0975–8887 (2012)Google Scholar
  15. 15.
    Kale, K.V., Aldawla, N.N.H.: Steganography enhancement: combining text and image approaches. Asian J. Comput. Sci. Inf. Technol.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of I.T., Mukesh Patel School of Technology and ManagementNMIMSMumbaiIndia

Personalised recommendations