A Computational System in Sequence of Information Ruptures

Authors(2) :-MD Nazimuddin Ahmed, Md Ateeq Ur Rahman

This paper contains the achievement of information lineage in malevolent situations. Data breach of individuals is a serious issue considering the information confidentiality and reliability of the data provider. The data provider should properly scrutinize the situation of data infringement and analyze possible solutions for blocking such trespassers. Here we intend to present a system that specifically eliminates all such fissures during allocation of data. The designed methods primarily concentrate upon narrowing down the breach of data instead of only providing alternate data or faked data. Data sent over any network is prone and exposed to different network data breaches. So, diligent security must be implemented with the information sent over the transferred network. With rapid increase in communication means, our smart phones and social networks have a lot of private and confidential information, and all these may be leaked without security. To counter this, data descent mechanism is used or in general the concept of data descent in malevolent conditions is deployed. This generally initiates with improper information fed to suspected requester. The system is developed in a critical environment prone to attack wherein we can transfer our data with different information coupled with different cryptographic techniques. Furthermore, experimental analysis of our design and proper implementation is done in vivid situations of within and outside transfer of organizational data. So, we define the aspects of data breach in various possible situations in general and well-defined implementation of our system in particular to analyze and provide a secure means of data descent.

Authors and Affiliations

MD Nazimuddin Ahmed
M.Tech Scholar, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India
Md Ateeq Ur Rahman
Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India

Information Breach, Data Descent, Responsibility, System Design And Analysis, Fingerprinting, Oblivious Transfer, Watermarking, Encipherment.

  1. M. U. Celik, G. Sharma, and A. M. Tekalp, "Lossless generalized- LSB data embedding," IEEE Trans. Image Process., vol. 14, no. 2, pp. 253-266, Feb. 2005.
  2. J. Fridrich, M. Goljan, and R. Du, "Invertible authentication watermark for JPEG images," in Proc. Inf. Technol. Coding Comput., Las Vegas, NV, USA, Apr. 2001, pp. 223-227.
  3. H. J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, and H. G. Choo, "A novel difference expansion transform for reversible data embedding," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 456-465, Sep. 2008.
  4. D. Coltuc, "Improved embedding for prediction based reversible watermarking," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 873-882, Sep. 2011.
  5. X. Li, B. Ying, and T. Zeng, "Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection," IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524-3533, Dec. 2011.
  6. Y. Hu, H. K. Lee, K. Chen, and J. Li, "Difference expansion based reversible data hiding using two embedding directions," IEEE Trans. Multimedia, vol. 10, no. 8, pp. 1500-1511, Dec. 2008.
  7. B. Ou, X. Li, Y. Zhao, R. Ni, and Y.-Q. Shi, "Pairwise predictionerror expansion for efficient reversible data hiding," IEEE Trans. Image Process., vol. 22, no. 12, pp. 5010-5021, Dec. 2013.
  8. W. L. Tai, C. M. Yeh, and C. C. Chang, "Reversible data hiding based on histogram modification of pixel differences," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp. 906-910, Jun. 2009.
  9. C. C. Lin, W. L. Tai, and C. C. Chang, "Multilevel reversible data hiding based on histogram modification of difference images," Pattern Recognit., vol. 41, no. 12, pp. 3582-3591, Dec. 2008.
  10. P. Tsai, Y. C. Hu, and H. L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Process., vol. 89, no. 6, pp. 1129-1143, Jun. 2009.

Publication Details

Published in : Volume 2 | Issue 4 | July-August 2017
Date of Publication : 2017-08-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 321-327
Manuscript Number : CSEIT172460
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

MD Nazimuddin Ahmed, Md Ateeq Ur Rahman, "A Computational System in Sequence of Information Ruptures", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.321-327, July-August-2017.
Journal URL : http://ijsrcseit.com/CSEIT172460

Article Preview