CFP last date
20 December 2024
Reseach Article

Stegtorrent using De-Clustering of Data

by Reshma Balasaheb Murkute, Nikita Sanjayrao Pattiwar, Shalaka Suryakant Shere, Nalini Tukaram Thombare, G.v.mane
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 21
Year of Publication: 2015
Authors: Reshma Balasaheb Murkute, Nikita Sanjayrao Pattiwar, Shalaka Suryakant Shere, Nalini Tukaram Thombare, G.v.mane
10.5120/20457-2814

Reshma Balasaheb Murkute, Nikita Sanjayrao Pattiwar, Shalaka Suryakant Shere, Nalini Tukaram Thombare, G.v.mane . Stegtorrent using De-Clustering of Data. International Journal of Computer Applications. 116, 21 ( April 2015), 1-5. DOI=10.5120/20457-2814

@article{ 10.5120/20457-2814,
author = { Reshma Balasaheb Murkute, Nikita Sanjayrao Pattiwar, Shalaka Suryakant Shere, Nalini Tukaram Thombare, G.v.mane },
title = { Stegtorrent using De-Clustering of Data },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 21 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number21/20457-2814/ },
doi = { 10.5120/20457-2814 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:57:43.727329+05:30
%A Reshma Balasaheb Murkute
%A Nikita Sanjayrao Pattiwar
%A Shalaka Suryakant Shere
%A Nalini Tukaram Thombare
%A G.v.mane
%T Stegtorrent using De-Clustering of Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 21
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Nowadays, For uploading and downloading of data using torrent people widely use internet. Existing system was less secure and time consuming. To avoid this problem stegtorrent using de-clustering of data is implemented. For file transfer service, StegTorrent is a new network steganographic method. To achieve availability and scalability of storage systems are important for existing information systems. One approach to achieving high availability of parallel disk systems is to replicate the data items on separate disk drives. Many applications require considerable space, which is increasing rapidly, and essential data kept in storage must be retained. Parallel storage configurations with multiple disk drives are used to satisfy these requirements. Because of the disk failure, when one copy is damaged then other can continue to be used. In the replication-based approach, it is also important to lower the cost of update operations. To ensure that the data mapping and requests are evenly divided among disks. In replication-based approach, it takes the advantages of low cost data modification and data recovery.

References
  1. Analysis of LSB based image steganography techniques:-Published in:Image Processing, 2001. Proceedings. 2001 International Conference on (Volume:3 )Date of Conference:2001
  2. AN OVERVIEW OF IMAGE STEGANOGRAPHYT. Morkel 1, J. H. P. Eloff 2, M. S. Olivier 3Information and Computer Security Architecture (ICSA) Research GroupDepartment of Computer Science University of Pretoria, 0002, Pretoria, South Africa
  3. THE BITTORRENT P2P FILE-SHARING SYSTEM: MEASUREMENTS AND ANALYSIS J. A. Pouwelse, P. Garbacki, D. H. J. Epema, H. J. Sips Department of Computer Science, Delft University of Technology, the Netherlands j. a. pouwelse@ewi. tudelft. nl
  4. Reversible Palette Image Steganography Based onDe-clustering and Predictive CodingHsien-Chu Wu1, Hui-Chuan Lin2 and Chin-Chen Chang3
  5. Chained Declustering: A New Availability Strategy for Multiprocssor Database machines by Hui- I Hsiao and David J. DeWitt
  6. A Modified High Capacity Image Steganography Technique Based on Wavelet TransformAli Al-Ataby1 andFawzi Al-Naima2
  7. "Stegtorrent Using Data De-Clustering"MurkuteReshma, Pattiwar Nikita, ShereShalaka, ThombareNalini,Student,Department of Information Technology, MMIT, Lohgaon, Pune, Maharashtra, India
  8. StegTorrent: a Steganographic Method for the P2P File Sharing Service Pawe?Kopiczko, WojciechMazurczyk, Krzysztof SzczypiorskiWarsaw University of Technology, Institute of TelecommunicationsWarsaw, Poland
  9. S. Hand, T. Roscoe, "Mnemosyne: Peer-to-Peer SteganographicStorage", Proc. of IPTPS 2002, LNCS 2429, pp. 130–140, 2002.
  10. R. Anderson, R. Needham, A. Shamir. "The Steganographic File System," Proc. of International Workshop on Information Hiding, 1998.
Index Terms

Computer Science
Information Sciences

Keywords

Network steganography Bittorrent StegTorrent information hiding Disk Failures Clustering and De-clustering Partitioning.