An Approach to Secure Larger Size Data with Authenticity and Integrity
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 4
Abstract
The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. The security of communication is a crucial issue on World Wide Web (internet) and within organizations. It is about confidentiality, integrity and authentication during access or editing of confidential internal documents. We are using a nonconventional steganography to increase security, which uses the cryptography to encrypt confidential message with the public and private keys. These keys are generated differently. Then loss-less compression takes place, which makes possible to hide larger amounts of information and documents using steganography. This paper presents a technique for constructing and implementing new algorithm based on embedding efficiently a large amount of data with high quality of encryption techniques, together with steganography, providing authentication and electronic documents integrity.
Authors and Affiliations
Sanjive Tyagi , Ajay Agarwal , Ramveer Singh
Design and Analysis of Enhanced HTTP Proxy Cashing Server
A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an interm...
Anti-Phishing Design Using Mutual Authentication Approach
The act of sending an e-mail to a client fallaciously declares to be a recognized genuine organization in an endeavour to deceive the client into compromise confidential information that will be used for identity theft....
Four Walsh Transform Sectors Feature Vectors for Image Retrieval from Image Databases
The work of this paper presents the new idea of using Walsh transform to generate the feature vector for content based image retrieval. The complex Walsh transform is conceived by multiplying Sal functions...
An Approach to Shortest Path Technique for BGP Using OSPF
The routing of traffic between Internet domains, or Autonomous Systems (ASs), a task known as interdomain routing, is currently handled by the Border Gateway Protocol (BGP). In this paper, we address interdomain routing...
Software Architectures Design Patterns Mining for Security Engineering
Data Mining for Software Engineering involves Architectural mining intelligence operations, which are knowledge gathering procedures. These intelligence operations go beyond basic data collection (assembling uncorrelate...