military secret coding passing and sharing the message

International Journal of Engineering Science Invention Research & Development; Vol. III, Issue II, August 2016 www.ijesird.com, e-ISSN: 2349-6185

MILITARY SECRET CODING PASSING AND

SHARING THE MESSAGE AS IMAGE

ENCRYPTION USING

KEBEROS TECHNIQUE

B.E Student

D.Saraswathy

1

,S.Radha

2

,S.Priyadarshini

3

,B. Patchaiamma

4

1,2,3

, Associate Professor

4

, Department of Computer Science And Engineering, IFET College of Engineering

saraswathidatchinamoorthi@gmail.co

m 1 , baranipriya055@gmail.com

priyadarshini.senthilmurugan@gmail.com

3 ,

2 , mailorthogreen@gmail.com

4

Abstract: The master and the head of the soldiers can communicate over the secured information by kerberos techniques get involved for the security purpose. Since the password given in the form of images. Head of one place need to communicate with head of another place through the master who controls all the head officials. Since one head wants to communicate with other head first he have to send his identity to master. Then master issue the ticket through kerberos technique.

Then master send half of the image which is the image of another one who he need to communicate. Through mosaic image passage with the code word get matched with the image of that he own.

He identify the message and relay response to the master

. non-corruptible authentication certificate (ticket granting ticket TGT) have a Ticket Granting server (TGS)users subsequently request route to other services from TGS on basis of users TGT using a complex protocol using

DES

I.

INTRODUCTION

Military information get exchanged between the heads through the master general who lies an intermediate and control the whole heads of the country. Hence retrieving the information in the sense of images in between the head by matching the image with the half image at the other end.

Matching those image while it is correct then he will identify that the received message is from our source. After prediction through kerberos ticket has resource address. After that he will encrypt the message and aware of attack information quite the information obtained is secured through kerberos.

The overall diagrammatic view of the structure given as

II.

KERBEROS TECHNIQUE

Its first report identified requirements as

Secure, reliable, transparent, adaptable.

Implemented using an authentication protocol based on

Needham-Schroeder.

A basic third-party authentication proposal. have an Authentication Server (AS),users initially negotiate with AS to identify self .AS provides a

D.Saraswathy

, S.Radha, S.Priyadarshini and B. Patchaiamma ijesird, Vol. III, Issue II, August 2016/ 109

International Journal of Engineering Science Invention Research & Development; Vol. III, Issue II, August 2016 www.ijesird.com, e-ISSN: 2349-6185

III.

KERBEROS REALMS

A Kerberos environment consists of a

Kerberos server,a number of clients, all registered with server application servers, sharing keys with server this is termed a realm typically a single administrative domain if have multiple a their

Kerberos servers must share keys and trust. automation, delegated admin, password synchronization, self-service password reset, federation Kerberos contains many of these elements

V.

PROPOSED SYSTEM

IV.

IDENTITY MANAGEMENT

Hiding information in the images then matching the image with another for authentication. Since steps here get synchronized as

1.

Head of the one controller need to communicate another to share military secret through kerberos.

2.

Since the request given is proceed and authorize the head 1 by issuing ticket issuing with session time.

3.

Then authorize done through sending half of the image of message to head1.

4.

Head1 sends the obtained image to the head2.Here head2 identify that it get received from military server.

5.

Then military general send another half image to the head2 where he can merge two half image and decode the required information.

6.

Securely the message get transmitted.

VI.

CONCLUSION

Use of common identity supervision scheme.Across multiple enterprises & numerous applications, supporting many thousands, even millions of users. Principle elements are: authentication, authorization, accounting, and provisioning, workflow

As a military secret have been shared between two heads an authorized military server.

D.Saraswathy

, S.Radha, S.Priyadarshini and B. Patchaiamma ijesird, Vol. III, Issue II, August 2016/ 110

International Journal of Engineering Science Invention Research & Development; Vol. III, Issue II, August 2016 www.ijesird.com, e-ISSN: 2349-6185

Kerberos technology since the message is encoded in images and decoded as a message at another end. We think this is quite reliable .

REFERENCES

1.

Secure And Authenticated Reversible Data Hiding In

Encrypted Images Dr.V. Khanaa, Dr.Krishna Mohanta,

Volume 2 Issue 3 March 2013, ISSN : 2319-7242.

2.

Data Hiding Method with Quality Control for Binary

Images , Ki-Hyun Jung, Kee-Young Yoo, J. Software

Engineering and Applications,2009,2:20-24.

3.

Secure Transformation of Data in Encrypted Image Using

Reversible Data Hiding Technique , S. Poongodi,

Dr.B.Kalavathi, M. Shanmugapriya Volume 2,Issue

4,July2013,ISSN:2319-5967,IJESIT.

4.

Secure Medical Image Transmission Using Combined

Approach of Data Hiding ,Encryption and Steganography ,

Vinay Pandey, Manish Shrivastava, Volume

2,Issue12,December 2012,ISSN:2277 128X.

5.

Medical Image Protection by Using Cryptography Data-

Hiding and Steganography , Vinay Pandey, Angad Singh,

Manish Srivastava, ISSN2250-2459,Volume

2,Issue1,January 2012.

6.

William Stallings, “ Cryptography and Network

Security principles and practices ”, fourth edition.

Pearson Prentice Hall, (2006). pp.401-419, pp.433-

435

7.

A. Boldyreva and V. Kumar, “ Provable-Security

Analysis of Authenticated Encryption in Kerberos ”.

IEEE Symposium on Security and Privacy (SP'07).

May 2007.

8.

C. Neuman, T. Yu, S. Hartman, and K. Raeburn, “ The

Kerberos network authentication service (V5)

”. Network

Working Group. Request for Comments:4120.

Available at http://www.ietf.org/rfc/rfc4120.txt, 2005.

9.

I. J. Lai and W. H. Tsai, “ secret-fragment-visible mosaic image-A new computer art and its application to information hiding

,” IEEE Trans. Inf

. Forens. Secur ., vol.

6, no. 3, pp.936-945, Sep. 2011

10.

X. Li, B. Yang, and T. Zeng, “ Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection ,” IEEE Trans. Image

Process.

, vol. 20, no.12, pp. 3524–3533, Dec. 2011.

D.Saraswathy

, S.Radha, S.Priyadarshini and B. Patchaiamma ijesird, Vol. III, Issue II, August 2016/ 111