A Review on Steganography & Cryptography Techniques
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
There is a need for more secure methods for transferring data between source to destination due to increase in the number of attack recorded during electronic exchange Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. These two techniques share the common goals and services of protecting the confidentiality, integrity and availability of information from unauthorized access. In this paper, information security and data hiding system that is based on steganography and cryptography is proposed to secure data transfer between the source and destination. A LSB (Least Significant Bit) method is the easiest way of hiding information in an image and yet it is effective.
Authors and Affiliations
Vijay Prakash, Aakash Gupta
slugPerformance of Multiplicative Data Perturbation for Privacy Preserving Data Mining
Data mining is a well-known technique for automatically and intelligently extracting information or knowledge from a large amount of data, however, it can also disclosure sensitive information about individuals compromi...
Twitter Dual Sentiment Analysis (TDSA)
Nowadays, Most of the people's interested area is social medias. They use social medias to know the reviews about various topics and areas. Sentiment analysis is the one of the technology used in social medias to know t...
Sixth Normal Form
Sixth Normal Form (6NF) is a term used in relational database theory by Christopher Date to describe databases which decompose relational variables to irreducible elements. While this form may be unimportant for non-tem...
Performance Improvement of Asymmetrical Multilevel Inverter with Different Optimization Algorithms
This paper presents a new asymmetrical multilevel inverter with Improved Performance by using different Optimization Algorithms. Each module produces 13 levels with four unequal DC sources and 10 switches. The proposed m...
Chromatic Prime Number for Circular Embedded Graph of the Tensor Product Graph
The Chromatic number of tensor product (G ⊗ H) of G and H has vertex set V(G) and V(H). In this paper, we introduced chromatic prime number on circular embedded graph of tensor product.