A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 5
Abstract
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
Monitoring of the Chemical Oxygen Demand and Identify the Presence of Gas
Water pollution is one of the biggest fears for the green globalization. In order to ensure the safe supply of the drinking water the quality needs to be monitor in real time. In this paper we present a design and develo...
Long Term Effect of INM on Yield and Nutrient Uptake of Rice-Rice Cropping System in North Konkan
Present investigation is a part of long term experiment which was started in 1986 87 at Model Agronomic Experimental Farm, Regional Agricultural Research Station, Karjat, Dist. Raigad, Maharashtra 18.920 N latitude, 73.3...
Adaptive Mobile Malware Detection Model Based on CBR
Today, the mobile phones can maintain lots of sensitive information. With the increasing capabilities of such phones, more and more malicious software malware targeting these devices have emerged. However there are many...
Importance of Chakrasana in Present Generation
Ayurveda is the science of life. It plays an important role to prevent and treat the disease. Ayurveda specifically deals with mind body balance. The main part of it is Yoga and Asana. Yoga provide us a simple remedies,...
Malware Detection in Android Applications
Android is a Linux based operating system used for smart phone devices. Since 2008, Android devices gained huge market share due to its open architecture and popularity. Increased popularity of the Android devices and as...