DATA SECURITY USING CRYPTOGRAPHY AND STEGNOGRAPHY
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 5
Abstract
Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. The security of communication is a crucial issue on World Wide Web (internet) and within organizations. It is about confidentiality, integrity and authentication during access or editing of confidential internal documents. We are using a nonconventional steganography to increase security, which uses the cryptography to encrypt confidential message with the public and private keys. These keys are generated differently. Then loss-less compression takes place, which makes possible to hide larger amounts of information and documents using steganography. This paper presents a technique for constructing and implementing new algorithm based on embedding efficiently a large amount of data with high quality of encryption techniques, together with steganography, providing authentication and electronic documents integrity.
Authors and Affiliations
Epuru Madhavarao, , Chikkala JayaRaju, , Pedasanaganti Divya, , A. S. K. Ratna
Enhancement of the Security of a Digital Image using the Moduli Set
Digital images have found usage in many applications. These images may contain confidential information and need to be protected when stored on memory or transmitted over networks. Many techniques have been proposed...
Coordinated control ULTC power transformer with STATCOM for Voltage Control and Reactive Power Compensation
The static synchronous compensator (STATCOM) is one type of FACTS devices which resembles in many respects a rotating synchronous condenser used for voltage control and reactive power compensation. The STATCOM...
Designing Authentication for Wireless Communication Security Protocol
Security is considered an important issue for mobile communication systems. In particular, the design of authentication mechanisms has received considerable research interest recently. However, most of the curren...
A Survey of Performance based Secure Routing Protocols in MANET
An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a...
An Unobservable Secure Routing Protocol against Wormhole and Black hole Attacks in MANET.
Mobile ad-hoc network (MANET) is a selfconfiguring infrastructure-less network of mobile devices. The sensitive information such as mobility behavior should be kept private from adversaries in wireless environments...