A Computational System in Sequence of Information Ruptures

Authors

  • MD Nazimuddin Ahmed  M.Tech Scholar, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India
  • Md Ateeq Ur Rahman  Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology, Hyderabad, Telangana, India

Keywords:

Information Breach, Data Descent, Responsibility, System Design And Analysis, Fingerprinting, Oblivious Transfer, Watermarking, Encipherment.

Abstract

This paper contains the achievement of information lineage in malevolent situations. Data breach of individuals is a serious issue considering the information confidentiality and reliability of the data provider. The data provider should properly scrutinize the situation of data infringement and analyze possible solutions for blocking such trespassers. Here we intend to present a system that specifically eliminates all such fissures during allocation of data. The designed methods primarily concentrate upon narrowing down the breach of data instead of only providing alternate data or faked data. Data sent over any network is prone and exposed to different network data breaches. So, diligent security must be implemented with the information sent over the transferred network. With rapid increase in communication means, our smart phones and social networks have a lot of private and confidential information, and all these may be leaked without security. To counter this, data descent mechanism is used or in general the concept of data descent in malevolent conditions is deployed. This generally initiates with improper information fed to suspected requester. The system is developed in a critical environment prone to attack wherein we can transfer our data with different information coupled with different cryptographic techniques. Furthermore, experimental analysis of our design and proper implementation is done in vivid situations of within and outside transfer of organizational data. So, we define the aspects of data breach in various possible situations in general and well-defined implementation of our system in particular to analyze and provide a secure means of data descent.

References

  1. M. U. Celik, G. Sharma, and A. M. Tekalp, "Lossless generalized- LSB data embedding," IEEE Trans. Image Process., vol. 14, no. 2, pp. 253-266, Feb. 2005.
  2. J. Fridrich, M. Goljan, and R. Du, "Invertible authentication watermark for JPEG images," in Proc. Inf. Technol. Coding Comput., Las Vegas, NV, USA, Apr. 2001, pp. 223-227.
  3. H. J. Kim, V. Sachnev, Y. Q. Shi, J. Nam, and H. G. Choo, "A novel difference expansion transform for reversible data embedding," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 456-465, Sep. 2008.
  4. D. Coltuc, "Improved embedding for prediction based reversible watermarking," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 873-882, Sep. 2011.
  5. X. Li, B. Ying, and T. Zeng, "Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection," IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524-3533, Dec. 2011.
  6. Y. Hu, H. K. Lee, K. Chen, and J. Li, "Difference expansion based reversible data hiding using two embedding directions," IEEE Trans. Multimedia, vol. 10, no. 8, pp. 1500-1511, Dec. 2008.
  7. B. Ou, X. Li, Y. Zhao, R. Ni, and Y.-Q. Shi, "Pairwise predictionerror expansion for efficient reversible data hiding," IEEE Trans. Image Process., vol. 22, no. 12, pp. 5010-5021, Dec. 2013.
  8. W. L. Tai, C. M. Yeh, and C. C. Chang, "Reversible data hiding based on histogram modification of pixel differences," IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp. 906-910, Jun. 2009.
  9. C. C. Lin, W. L. Tai, and C. C. Chang, "Multilevel reversible data hiding based on histogram modification of difference images," Pattern Recognit., vol. 41, no. 12, pp. 3582-3591, Dec. 2008.
  10. P. Tsai, Y. C. Hu, and H. L. Yeh, "Reversible image hiding scheme using predictive coding and histogram shifting," Signal Process., vol. 89, no. 6, pp. 1129-1143, Jun. 2009.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
MD Nazimuddin Ahmed, Md Ateeq Ur Rahman, " A Computational System in Sequence of Information Ruptures, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.321-327, July-August-2017.