Enhancing Security of Image Steganography using Visual Cryptography

Abstract

The undertaking centers around fostering a high level confirmation system to neutralize the developing danger of keylogging assaults. Keylogging, a sort of digital assault that catches keystrokes to take delicate data, represents a huge gamble to conventional confirmation techniques that depend on console input. This undertaking presents an original security approach joining two key developments: a double keypad input framework and a visual verification convention. The double keypad framework comprises of two separate information keypad (Ordinary Keypad and Virtual Keypad), each liable for an alternate part of the validation interaction. This division confuses the capacity for keyloggers to catch total confirmation arrangements, accordingly improving security. At the same time, the visual validation part presents a dynamic, graphical check process that supplements the double keypad framework. Clients interface with visual components like pictures or examples showed on a screen, which are not vulnerable to keylogging. This adds an extra layer of validation that is both easy to use and impervious to information catch by malignant programming. The mix of these two frameworks makes a diverse guard technique. The double keypad component decreases the gamble of compromised keystrokes, while the visual validation process guarantees that regardless of whether keystrokes are caught, the verification stays secure. The venture expects to convey a hearty, secure, and natural verification arrangement that improves assurance against keylogging and other digital dangers, giving a dependable method for getting delicate data in different applications.

Country : India

1 P. B. Chandane2 Omkar Lahane3 Ajinkya Makone4 Dipali Kshirsagar5 Sakshi Kolate

  1. Department of Computer Engineering, Adsul's Technical Campus, Chas, Maharashtra, India
  2. Department of Computer Engineering, Adsul's Technical Campus, Chas, Maharashtra, India
  3. Department of Computer Engineering, Adsul's Technical Campus, Chas, Maharashtra, India
  4. Department of Computer Engineering, Adsul's Technical Campus, Chas, Maharashtra, India
  5. Department of Computer Engineering, Adsul's Technical Campus, Chas, Maharashtra, India

IRJIET, Volume 8, Issue 11, November 2024 pp. 162-166

doi.org/10.47001/IRJIET/2024.811017

References

  1. Chandramouli, R., & Memon, N. (2019). "Analysis of LSB based image steganography techniques." Proceedings of the IEEE International Conference on Image Processing, 2001, 3, 1019-1022.
  2. Naor, M., & Shamir, A. (2018). "Visual cryptography." Advances in Cryptology - EUROCRYPT '94, 950, 1-11.
  3. Mishra, A. K., & Singh, S. (2016). "A Review on Image Steganography Techniques." International Journal of Computer Applications, 139(3), 1-5.
  4. Khan, M. A., & Ghosh, S. (2015). "A Survey of Image Steganography Techniques." International Journal of Computer Applications, 111(8), 1-6.
  5. Saha, S., & Gupta, D. (2014). "A New Image Steganography Technique Using Visual Cryptography." International Journal of Advanced Research in Computer Science and Software Engineering, 4(8), 879-883.