Satwinder Singh | Guru Nanak Dev University Amritsar (original) (raw)
Assistant professor
Supervisors: Co-Supervisor of Masters Research Student and Supervisor of MBA-IT program.
less
Uploads
Papers by Satwinder Singh
Information security is one of most important concern in any communication. There are number of s... more Information security is one of most important concern in any communication. There are number of security attacks related to information security and number of techniques has been implemented to prevent these attacks. Data hiding is related field to information security. Data hiding can be achieved be using Digital Steganography. Digital Steganography is art of hiding secret messages behind the innocent looking digital media. In this paper we have done state-of-the-art survey on image steganographic techniques and steganographic techniques used with different cryptographic algorithms, to provide extra layer of Security.
In today’s scenario security of data is very big challenge in any communication. Numerous data se... more In today’s scenario security of data is very big challenge in any communication. Numerous data security and hiding algorithms have been developed in the last decade. The Digital image Steganography is science of hiding sensitive information in another transmission medium to achieve secure and secret communication. In this paper we present the dual layer of security to the data, in which first layer is to encode data using Least Significant Bit image steganography method and in the second layer encrypt the data using Advance Encryption Standard Algorithm. Steganography does not replace the encryption of data, instead it provides extra security feature to it. In our work secret text message is hiding behind the digital image file and this image file is then encrypted using AES encryption algorithm.
Cloud computing provides exceptional flexibility of sharing of resources among millions of user a... more Cloud computing provides exceptional flexibility of sharing of resources among millions of user across the globe covering small business to large enterprise. It also provides an infrastructure to compile and process the complex scientific data for various data mining applications. It offers numerous benefits that help small and medium scale businesses to extract computing services at very affordable cost. As the consumption of cloud services is increasing, various security issues came into existence. In this paper we collect the information regarding number of security issues and categorize them.
Mobile social networks is network of connected people that communicate with each other through th... more Mobile social networks is network of connected people that communicate with each other through their Mobile Phones or Tablets. The increasing number of users of such applications in general and location aware applications more specifically suffers from the various security issues that must be resolved. But the information on social is being used in the ways for it may have not been originally made. In this paper we discuss several issues related to security and privacy of Mobile Social Networks and some sort of possible solutions to mitigate these issues.
In today’s scenario security of data is very big challenge in any communication. Numerous data se... more In today’s scenario security of data is very big challenge in any communication. Numerous data security and hiding algorithms have been developed in the last decade. The Digital image Steganography is science of hiding sensitive information in another transmission medium to achieve secure and secret communication. In this paper we present the dual layer of security to the data, in which first layer is to encode data using Least Significant Bit image steganography method and in the second layer encrypt the data using Advance Encryption Standard Algorithm. Steganography does not replace the encryption of data, instead it provides extra security feature to it. In our work secret text message is hiding behind the digital image file and this image file is then encrypted using AES encryption algorithm.
Information security is one of most important concern in any communication. There are number of s... more Information security is one of most important concern in any communication. There are number of security attacks related to information security and number of techniques has been implemented to prevent these attacks. Data hiding is related field to information security. Data hiding can be achieved be using Digital Steganography. Digital Steganography is art of hiding secret messages behind the innocent looking digital media. In this paper we have done state-of-the-art survey on image steganographic techniques and steganographic techniques used with different cryptographic algorithms, to provide extra layer of Security.
In today’s scenario security of data is very big challenge in any communication. Numerous data se... more In today’s scenario security of data is very big challenge in any communication. Numerous data security and hiding algorithms have been developed in the last decade. The Digital image Steganography is science of hiding sensitive information in another transmission medium to achieve secure and secret communication. In this paper we present the dual layer of security to the data, in which first layer is to encode data using Least Significant Bit image steganography method and in the second layer encrypt the data using Advance Encryption Standard Algorithm. Steganography does not replace the encryption of data, instead it provides extra security feature to it. In our work secret text message is hiding behind the digital image file and this image file is then encrypted using AES encryption algorithm.
Cloud computing provides exceptional flexibility of sharing of resources among millions of user a... more Cloud computing provides exceptional flexibility of sharing of resources among millions of user across the globe covering small business to large enterprise. It also provides an infrastructure to compile and process the complex scientific data for various data mining applications. It offers numerous benefits that help small and medium scale businesses to extract computing services at very affordable cost. As the consumption of cloud services is increasing, various security issues came into existence. In this paper we collect the information regarding number of security issues and categorize them.
Mobile social networks is network of connected people that communicate with each other through th... more Mobile social networks is network of connected people that communicate with each other through their Mobile Phones or Tablets. The increasing number of users of such applications in general and location aware applications more specifically suffers from the various security issues that must be resolved. But the information on social is being used in the ways for it may have not been originally made. In this paper we discuss several issues related to security and privacy of Mobile Social Networks and some sort of possible solutions to mitigate these issues.
In today’s scenario security of data is very big challenge in any communication. Numerous data se... more In today’s scenario security of data is very big challenge in any communication. Numerous data security and hiding algorithms have been developed in the last decade. The Digital image Steganography is science of hiding sensitive information in another transmission medium to achieve secure and secret communication. In this paper we present the dual layer of security to the data, in which first layer is to encode data using Least Significant Bit image steganography method and in the second layer encrypt the data using Advance Encryption Standard Algorithm. Steganography does not replace the encryption of data, instead it provides extra security feature to it. In our work secret text message is hiding behind the digital image file and this image file is then encrypted using AES encryption algorithm.