Multi-Factor Authentication Using Cryptography and Steganography
Multi-Factor Authentication Using Cryptography and Steganography
https://doi.org/10.22214/ijraset.2023.50818
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
Abstract: Authentication, security, and confidentiality are some of the most important topics of cyber security. It is a critical
component of any security system and is essential in ensuring that only authorized personnel can access sensitive information or
perform specific actions. There is a large amount of data that is confidential and there are lots of threats to the data if it is not
secured properly. It involves the protection of networks or data from unauthorized manipulation and destruction.
Keywords: Steganography, Cryptography, Authentication, Digital Security, Data Security, Multifactor Authentication.
I. INTRODUCTION
Authentication is a critical component of any security system that verifies the identity of a user, device, or application attempting to
access a resource or system. The purpose of this project is to design and implement a multi-factor authentication system to ensure
the security of the system using Cryptography and Steganography.
To ensure the security of the authentication system, the project will implement appropriate security measures, using the complexities
of Cryptography and Steganography. The project will also address requirements such as scalability, accessibility, usability, and
reliability.
III. SCOPE
The scope of the project is in the field of data security and cyber security. This project can be implemented in any company which
wants to secure its data with multilayer authentication.
The password crashing system and tools have been able to crack the passwords of big organizations and individuals by the following
techniques:-
1) Dictionary attack
2) Phishing
3) Social engineering
4) Malware
5) Brute Force attacks and so on
Hence passwords can be easily cracked these days. But when it comes to steganography and cryptography it is not much popular
and it is nearly next to impossible or quite difficult to crack the image steganography as well as the message which is encrypted.
The main aim of the project is to help at the national level to secure the data at a very high level.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 3207
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
V. PROBLEM STATEMENT
This project addresses the security problem of data or networks by providing fundamental cryptographic and steganography
mechanisms of authentication for the implementation of a secure infrastructure. The authentication is implemented with layers of
steganography and cryptography.
VI. IMPLEMENTATION AND METHODOLOGY
A. For sign up
1) Upload an Image
2) Enter a message which will be hidden in the Image using steganography
3) Enter a password to encrypt the above message
4) Press the sign-up button to create the account
5) Download the image which is generated by the system
B. For Log In
1) Upload the image which was generated from the sign-up process
2) Enter the password which was used to encrypt the message in the sign-up process
3) The password is used to decrypt the message in the image
4) If the message is same as it was in the sign-up process. Access is granted to the database otherwise access is denied
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 3208
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
VII. CONCLUSION
Thus, we have used the concept of Steganography and combined it with cryptography to offer strong multi-factor authentication. By
implementing appropriate security measures, the authentication system provides a robust and secure authentication mechanism. This
is a useful software to have a strong multi-layer authentication system where there is a lot of possibilities for the data to be leaked or
the network to get disrupted.
VIII. ACKNOWLEDGMENT
We sincerely thank our Atharva College of Engineering for providing us with a platform to prepare a project on the topic “Multi-
Factor Authentication Using Cryptography and Steganography”. We want to appreciate all the help and support we have received
from the organization and would like to thank them for instilling in us the need for this research and giving us the opportunity and
time to conduct and present research on the topic. We are also grateful for having Prof. Shweta Sharma as our guide.
REFERENCES
[1] Nandhini Subramanian, Somaya Al-Maadeed, Ahmed Bouridane, “Image Steganography: A Review of the Recent Advances” IEEE, January 2021.
[2] Ramadhan J. Mstafa, Christian Bach, “Information Hiding in Images Using Steganography Techniques”, Research Gate, March 2013.
[3] Mohammed A. Saleh “Image Steganography Techniques - A Review Paper”, IJARCCE, September 2018.
[4] Yahia Alemami, Mohamad Afendee Mohamed, Saleh Atiewi, “Research on Various Cryptography Techniques”, IJTRE, July 2019.
[5] Gurdeep Singh, Prateek Kumar, Nishant Taneja, Gurpreet Kaur “A RESEARCH PAPER ON CRYPTOGRAPHY”, IJTRE, December 2019.
[6] Dr. R.K Gupta “A Review Paper On Concepts Of Cryptography And Cryptographic Hash Function”, EJMCM, 2020
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 3209