SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1668
Encryption Based Approach to Find Fake Uploaders in Social Media
Shereena T Abdul Rasheed 1, Sadakathulla P.K 2
1MCA student, Centre for Computer Science and Information Technology, University of Calicut, Kerala
2Assistant Professor, Centre for Computer Science and Information Technology, University of Calicut, Kerala
-------------------------------------------------------------------------***------------------------------------------------------------------------
Abstract - In the digital era, we can see rapid growth in
digital contents through different Medias. As we know social
media plays an important role for generating digital contents
using modern electronic devices and sharingof dataandother
digital contents. Digital images are the one of the frequently
used media. In the context we have a challenge to find out the
fake uploaders. In this paper we are proposing a new strategy
to find out such fake uploaders by using encryption based
method. The proposed system uses steganography based
encryption to identify the fake uploaders in an easy way. Here
we embed some personal information In to the digital image
while uploading the content. By using this we can easily find
the individual easily.
Key Words: Encryption, Decryption, Steganography, social
media security, LSB Substitution.
1. INTRODUCTION
In the modern world, there exists a wide range imaging
techniques for capturing, storing and modifying digital
images. With the increase in consumer generated image
content using handheld devices such as mobile cameras and
ease of sharing, fake news via images are spreading rapidly
on social media. There has been a very active research area
in the last decade. Cryptography and steganography can be
used to provide security for digital content. Cryptography
uses mathematics to encrypt and decrypt data to provide
security by transforming plaintext into ciphertext.
Steganography is the art of hiding information in other
information.
With this paper, we mean that along with the photograph,
we also have related meta-data as contact number of the
person who upload that photograph firstly. Here, theperson
behind the photograph can be identified easily by this
application. Identifying person will eliminate the system of
easily spreading the image and this will also act as bigtool to
give evidence in front of justice court. Here we use an
algorithm that hides the contact number of the person who
uploads the image. The contact number that embeddedwith
the image never loses even if it is shared among different
people. Whenever a situation arises to find out the person
who has uploaded the image, we can easily find out the
contact number of the person by just applying the reverse
algorithm.
2. LETERATURE REVIEW
Besides cryptography, steganography can be used to secure
information. Steganography is a technique of hiding
data/information in digital media. Both Cryptography and
steganography methods of digital images are widely used to
protect and frustrate opponents' attacks from unauthorized
access. Thus, image encryption techniques are required to
protect the data [1]. There is a difference between
cryptography and steganography. Cryptography scrambles
messages so that they cannot be understood. On the other
hand, steganography hides the actual messageinanother[2].
Over the last few years, there are many different
steganographic methods areproposed.Mostofthemarevery
simple techniques so that those can be broken easily by
careful analysis of statistical propertiesofthechannel’snoise
[3].Recently,somenewsteganographicalgorithmshavebeen
proposed fortwo-color binaryimages[4].JohnsonandSushil
explain what steganography is and provide a brief history of
steganography, describe how steganography is applied to
hide information in images, and survey a few steganography
software applications [5]. TsungYuan and Wen-Hsiang
proposed a new steganographic method that uses change
tracking technique for hiding data in Microsoft Word
documents [6]. Sinha and Singh proposed a method to
encrypt an image for secure transmission [7].This method
use the digital signature of the image. Digital signatures
enable the recipient of a message to authenticate the sender
and verify that the message isintact.Kisiketal[4]proposeda
steganographic algorithm which embeds a secret message
into bitmap images and palette-based images.
Y.K JainandR.RAhriwalproposedLeastSignificanttechnique
to hide a message in an image. This technique generates a
steganographykeyafterembeddingthemessage.Thekeyhas
different layers. Every layer hasa fixed number of bits.These
bits are embedded in least significant of the image [8].The
method proposed by Mohammad A Ahmed uses Least
Significant technique to hide data in digital image. Then the
digital image will be implemented in hash significant
technique to get the result in hashing value[9].El-Emam
proposed a method which hides message in an image inform
if pixels. To retrieve the hidden message these pixels are
called. Steganography is used to hide and retrieve the
message [10]. Akhtar N, Johri P and Khan S implemented a
variation of traditional Least Significant Bit (LSB) algorithm.
It uses bit inversion method to enhance the quality of the
image which the message is hidden. This method has lesser
modification in pixels compared to traditional LSB method
[11]. P. U. Deshmuk and T. M. Pattewar proposed the edge
adaptive steganography based on LSB substitution method.
They hide secret message in sharp regions of the image.
This technique also improvesthe quality of stego image [12].
D. Baby, J. Thomas, G. Augustine, E. George and N.R. Michael
presented “Novel DWT based image securing method using
steganography”. They proposed a new steganography
technique in which multiple RGB images are embedded into
single RGB image using DWT steganography technique. This
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1669
method has level of PSNR (Peak signal - to - noise ratio) and
structural similarity (SSIM) index values [13]. G. Prashanti
and K. Sandhyarani have done survey on LSB based image
steganography and also two new techniques are presented.
First technique hides secret message in the cover image and
second one embeds a grayscaleimageintoanothergrayscale
image. These two techniques have great security because
secret information is hidden on random selected location of
LSBs of the image [14].
3. LETERATURE REVIEW
The proposed system aims tohidesthecontactnumberofthe
person who uploads the image. The following figure shows
the working of the proposed system.
Fig -1: Working of proposed system
Here we use the Least Significant Bit (LSB) substitution
method to hide the data within the image. This method
replaces the pixels of image by the secret data. The image is
stored as m-by-n matrix having several pixels. Each pixel in
the image is represented as RGB components and that
determine color of each individual pixel. RGB images are
stored as 24 bit format, where the RGB components are of 8
bits each.
Here we use the contact number of the person who uploads
the image and a string as a secret data. The string is used to
check whether theimagealreadycontainanycontactnumber
or not. This secret data is then converted into byte array.
Here we use 3 bit of R, 3 bit of G and 3 bit of B to hide 1 byte
of string. Here we replace first some pixels of the image and
the length of the secret data determines the number of pixels
to be replaced. This results only asmall changeinthevalueof
RGB component, which human eyes can’t detect.
Whenever any situationarises,thereversealgorithmhelpsto
identify the contact number of thepersonwhofirstlyuploads
the image. This secret data will not loss even if it shared by
different people.
3.1 Algorithm to hide data
Step 1: Load image into a variable ‘image’.
Step 2: Check whether the image is already contains any
contact number or not by reverse algorithm.
Step 3: If the image does not contain any numberthenchecks
the mode of image.
Step 4: If the image is an RGB image then store the secret
message into a variable ‘msg’ and set,
length= len(msg)
width, height= image . size
index= 0
encoded= image.copy()
Step 5: Repeat the following steps 6 to 8 until reachesthelast
pixel
Step 6: Store RGBcomponentof 1 pixel into variables r, gand
b
Step 7: if index < length then
c= msg[index]
imsg= int (ord(c))
r1= imsg & 7
imsg= imsg >> 3
g1=imsg & 7
imsg= imsg >> 3
b1=imsg & 7
r= r & 248
g= g & 248
b= b & 252
r= r | r1
g= g | g1
b= b| b1
Step 8: encode.putpixel((col,row),(r,g,b)) index= inex+1
Step 9: Stop
3.2 Algorithm to retrieve data
Step 1: Load image into a variable ‘image’
Step 2: Check whether the image is already contains any
contact number or not
Step 3: If the image does not contain any numberthenchecks
the mode of image
Step 4: If the image is an RGB image then store the secret
message into a variable ‘msg’ and set ,
width, height= image . size
index= 0
Step 5: Repeat the following steps 6 to 8 until reachesthelast
pixel
Step 6: Store RGBcomponentof 1 pixel into variables r, gand
b
Step 7: if index < length then
r1= r & 7
g1= (g & 7) << 3
b1= (b & 3) << 6
val = r1 | g1 | b1
msg = msg + (str ( chr ( val ) ) )
Step 8: index= inex+1
Step 9: Stop
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1670
4. CONCLUSION
We have studied about the spreading of fake news through
social media and this project aims to control these
fraudulent activities. We have used LSB substitution
algorithm to hide the secret data within the image. This
method is very simple and we can easily extract contact
number from the image by just applying the reverse
algorithm. We have tested our solutionona samplenetwork.
This method proves that it is possible to extract the contact
number of the uploader even if it shared many times.
REFERENCES
[1] H. Zenon, V. Sviatoslav, R.Yuriy, "Cryptography and
steganography of video information in modern
communications," 1998,
Citeseer.ist.psu.edu/hrytskiv98cryptography.html
[2] M.M. Amin, M. Salleh, S. Ibrahim, M.R Katmin, M.Z.I.
Shamsuddin, "Informationhidingusingsteganography,"
Telecommunication Technology, 2003. NCTT 2003
Proceedings. 4th National
[3] Elke, Fraz, "Steganography preserving statistical
properties," proceeding of the 5th internationally
Workshop oninformationHiding,Noordwijkerhout,The
Netherlands, October 2002, LNCS 2578, Springer 2003,
pp. 278-294.
[4] EE. Kisik Chang, J. Changho, L. Sangjin, "High Quality
Perceptual Steganographic Techniques," Springer, Vol.
2939, 2004, pp.518-531.
[5] N.F. Johnson, J. Suhil, " Exploring Steganography:Seeing
the Unseen," Computing practices, 2006, 2006,
http://www.jjtc.com/pub/r2026.pdf
[6] L. Tsung-Yuan, T. Wen-Hsiang ,"A New Steganographic
Method for Data Hiding in Microsoft Word Documents
by a ChangeTracking Technique," InformationForensics
and Security, IEEE Transactions on Vol.2,Issue1,March
2007 Page(s):24 – 30, Digital Object Identifier
10.1109/TIFS.2006.890310.
[7] A. Sinha, K. Singh, "A technique for image encryption
using digital signature," Source:OpticsCommunications,
vol.218, no. 4, 2003, pp.229-234.
[8] Y. K. Jain and R. R. Ahirwal, “A Novel Image
Steganography Method With Adaptive Number of Least
Significant Bits Modification Based on Private Stego-
Keys”, International Journal of Computer Science and
Security (IJCSS), vol. 4, (2010) March 1.
[9] Mohammad A. Ahmad, Dr. Imad Alshaikhli, Sondos O.
Alhussainan, “Achieving Security for Images by LSB and
MD5”, Journal of Advanced Computer Science and
Technology Research, Vol. 2, Issue No.3, Pages No. 127-
139, Sept., 2012.
[10] N.N. El-Emam, Hiding a large amount of data with high
security using steganography algorithm, Journal of
Computer Science 3 (2007) 223-232.
[11] Akhtar, N.; Johri, P.; Khan, S., "Enhancing the Security
and Quality of LSB Based Image Steganography,"
Computational Intelligence and Communication
Networks (CICN), 2013 5th International Conferenceon
, vol., no., pp.385,390, 27-29 Sept. 2013.
[12] P.U. Deshmukh and T.M. Pattewar, “A Novel Approach
for Edge Adaptive Steganography on LSB Insertion
Technique” IEEE International Conference on
Information Communication and Embedded Systems
(ICICES), Feb. 2014, pp. 1-5.
[13] D. Baby, J. Thomas, G. Augustine, E. George, N.R.Michael,
“ A Novel DWT based Image Securing method using
Steganography”, International Conference on
Information and Communication Technologies (ICICT),
Procedia Computer Science, April 2015, pp. 612-618.
[14] G. Prashanti, K. Sandhyarani, “A New Approach for Data
Hiding with LSB Steganography”, Emerging ICT for
Bridging the Future - Proceedings of the 49th Annual
Convention of the Computer Society of India CSI,
Springer 2015, pp. 423-430.

More Related Content

PDF
Implementation of image steganography using lab view
PDF
An LSB Method Of Image Steganographic Techniques
PDF
Conditional entrench spatial domain steganography
PDF
A novel hash based least significant bit (2 3-3) image steganography in spati...
PDF
Ijariie1132
PDF
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
PDF
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
PDF
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
Implementation of image steganography using lab view
An LSB Method Of Image Steganographic Techniques
Conditional entrench spatial domain steganography
A novel hash based least significant bit (2 3-3) image steganography in spati...
Ijariie1132
A Cryptographic Key Generation Using 2D Graphics pixel Shuffling
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...

What's hot (19)

PDF
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
PDF
An Infallible Method to Transfer Confidential Data using Delta Steganography
PDF
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
PDF
Iaetsd design of image steganography using haar dwt
PDF
Image steganography using least significant bit and secret map techniques
PDF
IRJET- Application of Machine Learning for Data Security
PDF
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
PDF
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
PDF
11.data security using cryptosteganography in web application
PDF
High Capacity and Security Steganography Using Discrete Wavelet Transform
PDF
D0341829
PDF
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
PDF
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
PDF
RSA Based Secured Image Steganography Using DWT Approach
PDF
encryption based lsb steganography technique for digital images and text data
PDF
Review paper on Data Security using Cryptography and Steganography
PDF
www.ijerd.com
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
An Infallible Method to Transfer Confidential Data using Delta Steganography
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
Iaetsd design of image steganography using haar dwt
Image steganography using least significant bit and secret map techniques
IRJET- Application of Machine Learning for Data Security
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
International Journal of Computational Engineering Research(IJCER)
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
11.data security using cryptosteganography in web application
High Capacity and Security Steganography Using Discrete Wavelet Transform
D0341829
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
RSA Based Secured Image Steganography Using DWT Approach
encryption based lsb steganography technique for digital images and text data
Review paper on Data Security using Cryptography and Steganography
www.ijerd.com
Ad

Similar to IRJET- Encryption based Approach to Find Fake Uploaders in Social Media (20)

PDF
L045056469
PDF
Comparative Study of Spatial Domain Image Steganography Techniques
PDF
High PSNR Based Image Steganography
PDF
IRJET- Data Hiding in Digital Image using Steganography
PDF
IRJET- Encryption and Authentication of Image by using Data Hiding
PDF
A Comparative Study And Literature Review Of Image Steganography Techniques
PDF
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
PDF
www.ijerd.com
PDF
Enhancement of Payload Capacity for Image Steganography based on LSB
PDF
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
PDF
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
PDF
Implementation for Data Hiding using Visual Cryptography
PDF
G017444651
PDF
Implementation of Steganographic Techniques and its Detection.
PDF
P017329498
PDF
An Architectural Approach of Data Hiding In Images Using Mobile Communication
PDF
A Survey of Image Based Steganography
PDF
Proposed aes for image steganography in different medias
PDF
Proposed aes for image steganography in different medias
PDF
O017429398
L045056469
Comparative Study of Spatial Domain Image Steganography Techniques
High PSNR Based Image Steganography
IRJET- Data Hiding in Digital Image using Steganography
IRJET- Encryption and Authentication of Image by using Data Hiding
A Comparative Study And Literature Review Of Image Steganography Techniques
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
www.ijerd.com
Enhancement of Payload Capacity for Image Steganography based on LSB
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Implementation for Data Hiding using Visual Cryptography
G017444651
Implementation of Steganographic Techniques and its Detection.
P017329498
An Architectural Approach of Data Hiding In Images Using Mobile Communication
A Survey of Image Based Steganography
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
O017429398
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Digital Logic Computer Design lecture notes
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
PPT on Performance Review to get promotions
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPT
Mechanical Engineering MATERIALS Selection
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Sustainable Sites - Green Building Construction
PPTX
Construction Project Organization Group 2.pptx
PPTX
Current and future trends in Computer Vision.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPT
introduction to datamining and warehousing
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPT
Project quality management in manufacturing
UNIT-1 - COAL BASED THERMAL POWER PLANTS
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Foundation to blockchain - A guide to Blockchain Tech
Digital Logic Computer Design lecture notes
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Model Code of Practice - Construction Work - 21102022 .pdf
bas. eng. economics group 4 presentation 1.pptx
PPT on Performance Review to get promotions
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Mechanical Engineering MATERIALS Selection
CH1 Production IntroductoryConcepts.pptx
Sustainable Sites - Green Building Construction
Construction Project Organization Group 2.pptx
Current and future trends in Computer Vision.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
CYBER-CRIMES AND SECURITY A guide to understanding
introduction to datamining and warehousing
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Embodied AI: Ushering in the Next Era of Intelligent Systems
Project quality management in manufacturing

IRJET- Encryption based Approach to Find Fake Uploaders in Social Media

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1668 Encryption Based Approach to Find Fake Uploaders in Social Media Shereena T Abdul Rasheed 1, Sadakathulla P.K 2 1MCA student, Centre for Computer Science and Information Technology, University of Calicut, Kerala 2Assistant Professor, Centre for Computer Science and Information Technology, University of Calicut, Kerala -------------------------------------------------------------------------***------------------------------------------------------------------------ Abstract - In the digital era, we can see rapid growth in digital contents through different Medias. As we know social media plays an important role for generating digital contents using modern electronic devices and sharingof dataandother digital contents. Digital images are the one of the frequently used media. In the context we have a challenge to find out the fake uploaders. In this paper we are proposing a new strategy to find out such fake uploaders by using encryption based method. The proposed system uses steganography based encryption to identify the fake uploaders in an easy way. Here we embed some personal information In to the digital image while uploading the content. By using this we can easily find the individual easily. Key Words: Encryption, Decryption, Steganography, social media security, LSB Substitution. 1. INTRODUCTION In the modern world, there exists a wide range imaging techniques for capturing, storing and modifying digital images. With the increase in consumer generated image content using handheld devices such as mobile cameras and ease of sharing, fake news via images are spreading rapidly on social media. There has been a very active research area in the last decade. Cryptography and steganography can be used to provide security for digital content. Cryptography uses mathematics to encrypt and decrypt data to provide security by transforming plaintext into ciphertext. Steganography is the art of hiding information in other information. With this paper, we mean that along with the photograph, we also have related meta-data as contact number of the person who upload that photograph firstly. Here, theperson behind the photograph can be identified easily by this application. Identifying person will eliminate the system of easily spreading the image and this will also act as bigtool to give evidence in front of justice court. Here we use an algorithm that hides the contact number of the person who uploads the image. The contact number that embeddedwith the image never loses even if it is shared among different people. Whenever a situation arises to find out the person who has uploaded the image, we can easily find out the contact number of the person by just applying the reverse algorithm. 2. LETERATURE REVIEW Besides cryptography, steganography can be used to secure information. Steganography is a technique of hiding data/information in digital media. Both Cryptography and steganography methods of digital images are widely used to protect and frustrate opponents' attacks from unauthorized access. Thus, image encryption techniques are required to protect the data [1]. There is a difference between cryptography and steganography. Cryptography scrambles messages so that they cannot be understood. On the other hand, steganography hides the actual messageinanother[2]. Over the last few years, there are many different steganographic methods areproposed.Mostofthemarevery simple techniques so that those can be broken easily by careful analysis of statistical propertiesofthechannel’snoise [3].Recently,somenewsteganographicalgorithmshavebeen proposed fortwo-color binaryimages[4].JohnsonandSushil explain what steganography is and provide a brief history of steganography, describe how steganography is applied to hide information in images, and survey a few steganography software applications [5]. TsungYuan and Wen-Hsiang proposed a new steganographic method that uses change tracking technique for hiding data in Microsoft Word documents [6]. Sinha and Singh proposed a method to encrypt an image for secure transmission [7].This method use the digital signature of the image. Digital signatures enable the recipient of a message to authenticate the sender and verify that the message isintact.Kisiketal[4]proposeda steganographic algorithm which embeds a secret message into bitmap images and palette-based images. Y.K JainandR.RAhriwalproposedLeastSignificanttechnique to hide a message in an image. This technique generates a steganographykeyafterembeddingthemessage.Thekeyhas different layers. Every layer hasa fixed number of bits.These bits are embedded in least significant of the image [8].The method proposed by Mohammad A Ahmed uses Least Significant technique to hide data in digital image. Then the digital image will be implemented in hash significant technique to get the result in hashing value[9].El-Emam proposed a method which hides message in an image inform if pixels. To retrieve the hidden message these pixels are called. Steganography is used to hide and retrieve the message [10]. Akhtar N, Johri P and Khan S implemented a variation of traditional Least Significant Bit (LSB) algorithm. It uses bit inversion method to enhance the quality of the image which the message is hidden. This method has lesser modification in pixels compared to traditional LSB method [11]. P. U. Deshmuk and T. M. Pattewar proposed the edge adaptive steganography based on LSB substitution method. They hide secret message in sharp regions of the image. This technique also improvesthe quality of stego image [12]. D. Baby, J. Thomas, G. Augustine, E. George and N.R. Michael presented “Novel DWT based image securing method using steganography”. They proposed a new steganography technique in which multiple RGB images are embedded into single RGB image using DWT steganography technique. This
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1669 method has level of PSNR (Peak signal - to - noise ratio) and structural similarity (SSIM) index values [13]. G. Prashanti and K. Sandhyarani have done survey on LSB based image steganography and also two new techniques are presented. First technique hides secret message in the cover image and second one embeds a grayscaleimageintoanothergrayscale image. These two techniques have great security because secret information is hidden on random selected location of LSBs of the image [14]. 3. LETERATURE REVIEW The proposed system aims tohidesthecontactnumberofthe person who uploads the image. The following figure shows the working of the proposed system. Fig -1: Working of proposed system Here we use the Least Significant Bit (LSB) substitution method to hide the data within the image. This method replaces the pixels of image by the secret data. The image is stored as m-by-n matrix having several pixels. Each pixel in the image is represented as RGB components and that determine color of each individual pixel. RGB images are stored as 24 bit format, where the RGB components are of 8 bits each. Here we use the contact number of the person who uploads the image and a string as a secret data. The string is used to check whether theimagealreadycontainanycontactnumber or not. This secret data is then converted into byte array. Here we use 3 bit of R, 3 bit of G and 3 bit of B to hide 1 byte of string. Here we replace first some pixels of the image and the length of the secret data determines the number of pixels to be replaced. This results only asmall changeinthevalueof RGB component, which human eyes can’t detect. Whenever any situationarises,thereversealgorithmhelpsto identify the contact number of thepersonwhofirstlyuploads the image. This secret data will not loss even if it shared by different people. 3.1 Algorithm to hide data Step 1: Load image into a variable ‘image’. Step 2: Check whether the image is already contains any contact number or not by reverse algorithm. Step 3: If the image does not contain any numberthenchecks the mode of image. Step 4: If the image is an RGB image then store the secret message into a variable ‘msg’ and set, length= len(msg) width, height= image . size index= 0 encoded= image.copy() Step 5: Repeat the following steps 6 to 8 until reachesthelast pixel Step 6: Store RGBcomponentof 1 pixel into variables r, gand b Step 7: if index < length then c= msg[index] imsg= int (ord(c)) r1= imsg & 7 imsg= imsg >> 3 g1=imsg & 7 imsg= imsg >> 3 b1=imsg & 7 r= r & 248 g= g & 248 b= b & 252 r= r | r1 g= g | g1 b= b| b1 Step 8: encode.putpixel((col,row),(r,g,b)) index= inex+1 Step 9: Stop 3.2 Algorithm to retrieve data Step 1: Load image into a variable ‘image’ Step 2: Check whether the image is already contains any contact number or not Step 3: If the image does not contain any numberthenchecks the mode of image Step 4: If the image is an RGB image then store the secret message into a variable ‘msg’ and set , width, height= image . size index= 0 Step 5: Repeat the following steps 6 to 8 until reachesthelast pixel Step 6: Store RGBcomponentof 1 pixel into variables r, gand b Step 7: if index < length then r1= r & 7 g1= (g & 7) << 3 b1= (b & 3) << 6 val = r1 | g1 | b1 msg = msg + (str ( chr ( val ) ) ) Step 8: index= inex+1 Step 9: Stop
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 10 | Oct 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1670 4. CONCLUSION We have studied about the spreading of fake news through social media and this project aims to control these fraudulent activities. We have used LSB substitution algorithm to hide the secret data within the image. This method is very simple and we can easily extract contact number from the image by just applying the reverse algorithm. We have tested our solutionona samplenetwork. This method proves that it is possible to extract the contact number of the uploader even if it shared many times. REFERENCES [1] H. Zenon, V. Sviatoslav, R.Yuriy, "Cryptography and steganography of video information in modern communications," 1998, Citeseer.ist.psu.edu/hrytskiv98cryptography.html [2] M.M. Amin, M. Salleh, S. Ibrahim, M.R Katmin, M.Z.I. Shamsuddin, "Informationhidingusingsteganography," Telecommunication Technology, 2003. NCTT 2003 Proceedings. 4th National [3] Elke, Fraz, "Steganography preserving statistical properties," proceeding of the 5th internationally Workshop oninformationHiding,Noordwijkerhout,The Netherlands, October 2002, LNCS 2578, Springer 2003, pp. 278-294. [4] EE. Kisik Chang, J. Changho, L. Sangjin, "High Quality Perceptual Steganographic Techniques," Springer, Vol. 2939, 2004, pp.518-531. [5] N.F. Johnson, J. Suhil, " Exploring Steganography:Seeing the Unseen," Computing practices, 2006, 2006, http://www.jjtc.com/pub/r2026.pdf [6] L. Tsung-Yuan, T. Wen-Hsiang ,"A New Steganographic Method for Data Hiding in Microsoft Word Documents by a ChangeTracking Technique," InformationForensics and Security, IEEE Transactions on Vol.2,Issue1,March 2007 Page(s):24 – 30, Digital Object Identifier 10.1109/TIFS.2006.890310. [7] A. Sinha, K. Singh, "A technique for image encryption using digital signature," Source:OpticsCommunications, vol.218, no. 4, 2003, pp.229-234. [8] Y. K. Jain and R. R. Ahirwal, “A Novel Image Steganography Method With Adaptive Number of Least Significant Bits Modification Based on Private Stego- Keys”, International Journal of Computer Science and Security (IJCSS), vol. 4, (2010) March 1. [9] Mohammad A. Ahmad, Dr. Imad Alshaikhli, Sondos O. Alhussainan, “Achieving Security for Images by LSB and MD5”, Journal of Advanced Computer Science and Technology Research, Vol. 2, Issue No.3, Pages No. 127- 139, Sept., 2012. [10] N.N. El-Emam, Hiding a large amount of data with high security using steganography algorithm, Journal of Computer Science 3 (2007) 223-232. [11] Akhtar, N.; Johri, P.; Khan, S., "Enhancing the Security and Quality of LSB Based Image Steganography," Computational Intelligence and Communication Networks (CICN), 2013 5th International Conferenceon , vol., no., pp.385,390, 27-29 Sept. 2013. [12] P.U. Deshmukh and T.M. Pattewar, “A Novel Approach for Edge Adaptive Steganography on LSB Insertion Technique” IEEE International Conference on Information Communication and Embedded Systems (ICICES), Feb. 2014, pp. 1-5. [13] D. Baby, J. Thomas, G. Augustine, E. George, N.R.Michael, “ A Novel DWT based Image Securing method using Steganography”, International Conference on Information and Communication Technologies (ICICT), Procedia Computer Science, April 2015, pp. 612-618. [14] G. Prashanti, K. Sandhyarani, “A New Approach for Data Hiding with LSB Steganography”, Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI, Springer 2015, pp. 423-430.