STEGANODB - A SECURE DATABASE USING STEGANOGRAPHY

The safety of data and communications for both organizations and personal purposes which at the same time is easy to maintain and having less overhead on system resources is a very important issue. This paper presents a new/alternate secure Database system based on steganography for data hiding. The system provides integrity more confidentiality, and authentication during access or editing of confidential data. The proposed DB system uses steganography technique to store a database of records. The system allows a user to create basic tables and records which are hidden from others inside an image. In this paper propose an architecture which can be used by application developers to retrieve data from the created database in an easy manner. The proposed method is highly useful for use as an embedded DB also in mobile computing as it can store small amount of data easily.

[1]  A. Touir,et al.  A New Image Steganography Technique , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[2]  Muhammad Sher,et al.  Digital steganography for ASCII text documents Ph.D. research proposal , 2009, FIT.

[3]  Mehdi Tibouchi,et al.  Securing E-passports with Elliptic Curves , 2011, IEEE Security & Privacy.

[4]  Che-Wei Lee,et al.  A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability , 2012, IEEE Transactions on Image Processing.

[5]  L. Jani Anbarasi,et al.  A novel approach for secret data transfer using image steganography and visual cryptography , 2011, ICCCS '11.

[6]  Sos S. Agaian,et al.  Alpha-trimmed image estimation for JPEG steganography detection , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[7]  Shengdun Hu A Novel Video Steganography based on Non-uniform Rectangular Partition , 2011 .

[8]  Wen-Hsiang Tsai,et al.  Quotation Authentication: A New Approach and Efficient Solutions by Cascaded Hashing Techniques , 2010, IEEE Transactions on Information Forensics and Security.

[9]  Daniela Stanescu,et al.  Steganography on embedded devices , 2009, 2009 5th International Symposium on Applied Computational Intelligence and Informatics.

[10]  Y. D. Chincholkar,et al.  STEGANOGRAPHY FOR TWO AND THREE LSBs USING EXTENDED SUBSTITUTION ALGORITHM , 2013 .

[11]  John Langford,et al.  Provably Secure Steganography , 2009, IEEE Trans. Computers.

[12]  Tao Zhang,et al.  Detection of LSB matching steganography based on distribution of pixel differences in natural images , 2010, 2010 International Conference on Image Analysis and Signal Processing.

[13]  Huayong Ge,et al.  Steganography and steganalysis based on digital image , 2011, 2011 4th International Congress on Image and Signal Processing.

[14]  Qingzhong Liu,et al.  A JPEG-based statistically invisible steganography , 2011, ICIMCS '11.

[15]  K.R. Venugopal,et al.  Authentication of secret information in image Steganography , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.