DATA SECURITY USING CRYPTOGRAPHY AND STEGNOGRAPHY
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 5
Abstract
Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. The security of communication is a crucial issue on World Wide Web (internet) and within organizations. It is about confidentiality, integrity and authentication during access or editing of confidential internal documents. We are using a nonconventional steganography to increase security, which uses the cryptography to encrypt confidential message with the public and private keys. These keys are generated differently. Then loss-less compression takes place, which makes possible to hide larger amounts of information and documents using steganography. This paper presents a technique for constructing and implementing new algorithm based on embedding efficiently a large amount of data with high quality of encryption techniques, together with steganography, providing authentication and electronic documents integrity.
Authors and Affiliations
Epuru Madhavarao, , Chikkala JayaRaju, , Pedasanaganti Divya, , A. S. K. Ratna
A Novel Watermarking Technique Based on Visual Cryptography
Digital Watermark processing technology has developed very rapidly during the recent years and widely applied to protect the copyright of digital image. In today’s scenario protection of digital data is utmost ne...
Generation of Electricity by Renewable Energy Sources & Transmission of Energy Production Units using PLC & SCADA
ABSTRACTAutomation means Delegation of human control to machine. A PLC (Programmable Logic Controller) is a device that was invented to replace the necessary sequential relay circuits for machine control. A SCADA (S...
“Identifying the Quality of Object Oriented Software System using Modularization Approach”
Software developers develop their software with some standard specification, but important issue is how to measure the quality of software modularization. In this paper advanced set of metrics are proposed which me...
MEMS ACCELEROMETER BASED HAND GESTURE RECOGNITION
This paper presents an MEMS accelerometer mostly based on gesture recognition algorithm and its applications. The hardware module consists of a triaxial mems accelerometer, microcontroller, and zigbee wireless...
A Comparative Survey on Availability and Integrity Verification in Multi-Cloud
In cloud environment, an enormous amount of data is produced everyday. Many organizations are now migrated to cloud and demand for resource is increasing. Hence the providers are now delivering multi-cloud environm...