Chaffing and Winnowing Research Papers (original) (raw)
0 Followers
Recent papers in Chaffing and Winnowing
Advanced Image Steganography is used to develop a secure path for sending or receiving secret text messages. Using Chaff and Winnow& AES (Advanced Encryption Standard) encryption technique, the text message is encrypted and sent to... more
Advanced Image Steganography is used to develop a secure path for sending or receiving secret text messages. Using Chaff and Winnow& AES (Advanced Encryption Standard) encryption technique, the text message is encrypted and sent to receiver very securely. The system uses AES encryption to encrypt the user's secret text message and key information while sending it to receiver also using Diffie-Hellman key generation for sharing secret key between sender and receiver.
Abstract: User application has been developed with very rapid progress. Security vulnerabilities due to amendment of escape characters and comment characters with the actual keywords becomes predominant in the current IT environments.... more
Abstract: User application has been developed with very rapid progress. Security vulnerabilities due to amendment of escape characters and comment characters with the actual keywords becomes predominant in the current IT environments. There are some malicious attacks which can deceive this SQL. To stop string literal escape characters injections, many techniques have been proposed but they require large code modification and/or large extra time overhead.
The work of this paper proposes a technique SQL Injection Protector for Authentication (SQLIPA) with the help of removal of SQL Query attribute Algorithm. In addition to the proposed technique we are trying to store the user credentials in the images and retrieve the same for validation. These images will be stored in BLOB format with Encrypted layer in the backend to hide the tuples used for storage. Validating the XML content with typed dataset will scrutinize the input data further.
Keywords: Chaffing and Winnowing, SQL Injection, Obfuscation, Hash defined algorithm
Title: OBFUSCATED PROTECTION WITH CHAFFING AND WINNOWING AGAINST SQL INJECTION
Author: Ms. A. Sivasankari, Sangeetha.V
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals