International Journal For Multidisciplinary Research

E-ISSN: 2582-2160     Impact Factor: 9.24

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 7, Issue 2 (March-April 2025) Submit your research before last 3 days of April to publish your research paper in the issue of March-April.

Advanced System for Secure Military Communication Using Image Steganography and Block-Rotary Encryption

Author(s) Ms. Malavika V, Vinish A, Dr. Shaji B, Dr. Justin Jose
Country India
Abstract This project offers a thorough security framework for safe military data transfer, including face recognition, block-rotary encryption, and image steganography to protect private data. Block-rotary encryption further secures the buried data by jumbling it with a secret key, while picture steganography hides data within image pixels, rendering it invisible to the human eye. Face recognition is used for multi-factor authentication to improve security, requiring soldiers to use facial recognition to confirm their identification. Administrators, Departments, and Soldiers are among the user roles that the system offers; each has specific access requirements and features. While departments supervise soldiers and decode vital information, administrators control accounts and deal with data decryption. Sensitive information can be safely exchanged and encoded by soldiers. The system offers a strong solution for secret and safe military communication by fusing cutting-edge encryption techniques with role-based access control, biometric authentication, and data secrecy. The suggested solution responds to the increasing demand for secure communication in military operations by providing a tiered security strategy. It guarantees that sensitive data is hidden and shielded from unwanted access during transmission by fusing steganography, encryption, and biometric authentication. While block-rotary encryption adds another layer of complexity that prevents decryption without the right key, image steganography enables the secret embedding of data within common images. By ensuring that various users, including administrators, departments, and soldiers, have the proper access privileges according to their duties, role-based access management reduces the possibility of data breaches. All things consider, this system offers a very safe, comprehensive way to protect military communications from possible dangers.
Keywords Steganography, Block-rotary encryption, Face recognition, Decryption
Field Computer
Published In Volume 7, Issue 2, March-April 2025
Published On 2025-03-26
DOI https://doi.org/10.36948/ijfmr.2025.v07i02.39928
Short DOI https://doi.org/g892n8

Share this