Applying LSB Steganography for Disseminating Academic Testimonials in e-Learning and its Authentication aspects
Soumendu Banerjee, Sunil Karforma, Akash Nag "Applying LSB Steganography for Disseminating Academic Testimonials in e-Learning and its Authentication aspects". International Journal of Computer Trends and Technology (IJCTT) V47(3):170-175, May 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
In the present day scenario, security plays a vital role in e-learning system. In an e-learning system, all kinds of transmissions and communications between the participants of any e-learning system are done via Internet. Since, Internet is publicly accessible; authenticity has a major role to play. Steganography is one of such techniques through which authenticity can be achieved in e-learning. In our proposed system, we have applied Least Significant Bit steganography technique on the color images and also discussed about the compression algorithm. For all the individual applications, we calculate the MSE and PSNR values to check the portability of the proposed system.
References
[1] Weippl, R.E., “Security in E-Learning”, Springer, 2005
[2] Talukdar, Kamrul Hasan and Koichi Harada, “Haar wavelet based approach for image compression and quality assessment of compressed image”, arXiv preprint arXiv: 1010.4084(2010)
[3] Adobe Developers Association, “TIFF (TM) Revision 6.0-Final”, (1992)
[4] Nag Akash and Karforma Sunil, “DSA security enhancement through efficient nonce generation”, International Journal of Global Research in Computer Science, vol.5(10), pp:14-19, 2014
[5] https://en.wikipedia.org/wiki/Steganography
[6]http://www.slideshare.net/SreelekshmiSree1/image-steganography-using-lsb
[7] T. Halder and S.Karforma, “A lsb-indexed steganographic approach to secure e-governance data”, Second International Conference on Computing and Systems-2013, Department of computer science, The University of Burdwan, September 21-22, 2013, pp:158-163.
Keywords
e-Learning, LSB based steganography, Haar wavelet transform, PackBits compression.