An Approach to Secure Larger Size Data with Authenticity and Integrity
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 4
Abstract
The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. The security of communication is a crucial issue on World Wide Web (internet) and within organizations. It is about confidentiality, integrity and authentication during access or editing of confidential internal documents. We are using a nonconventional steganography to increase security, which uses the cryptography to encrypt confidential message with the public and private keys. These keys are generated differently. Then loss-less compression takes place, which makes possible to hide larger amounts of information and documents using steganography. This paper presents a technique for constructing and implementing new algorithm based on embedding efficiently a large amount of data with high quality of encryption techniques, together with steganography, providing authentication and electronic documents integrity.
Authors and Affiliations
Sanjive Tyagi , Ajay Agarwal , Ramveer Singh
An Approach to Secure Larger Size Data with Authenticity and Integrity
The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authen...
ROUTING PROBLEM FOR PARALLEL ROUTE BASED MAXMIN ANT SYSTEM
The proposed work presented a modified MAX-MIN Ant System (MMAS) algorithm to solve the routing problem, in which known demand are supplied from a store house with parallel routes for new local search. Routing Problem is...
PERFORMANCE COMPARISION OF QOS STABILITY METHODS IN WIMAX NETWORKS
Recently IEEE 802.16 WiMAX has attracted a lot of attention in wireless networking research and applications. An attempt had been made to compare DropTail, RED, Proportional fairness and DRR protocol...
CHALLENGES IN COMPUTING TODAY
This paper reviews the challenges faced by ordinary users in the domain of computing today.As there are numerous problems in computing,with each problem centered around different issues and each one r...
E-Governance and Effective Deliverance of Information and Services to Citizens Architecture
By Progression of information technology resources in India, great opportunity comes to deliver information and services to citizens and business. Proper distribution and delivery of government information and services t...