DATA SECURITY USING CRYPTOGRAPHY AND STEGNOGRAPHY
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 5
Abstract
Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. The security of communication is a crucial issue on World Wide Web (internet) and within organizations. It is about confidentiality, integrity and authentication during access or editing of confidential internal documents. We are using a nonconventional steganography to increase security, which uses the cryptography to encrypt confidential message with the public and private keys. These keys are generated differently. Then loss-less compression takes place, which makes possible to hide larger amounts of information and documents using steganography. This paper presents a technique for constructing and implementing new algorithm based on embedding efficiently a large amount of data with high quality of encryption techniques, together with steganography, providing authentication and electronic documents integrity.
Authors and Affiliations
Epuru Madhavarao, , Chikkala JayaRaju, , Pedasanaganti Divya, , A. S. K. Ratna
High Performance Computing: A Survey
This paper surveys techniques used for high performance computing. High performance computing is used to develop machines which provide computing power like super computers. It concentrates on both software as well...
Remote Monitoring, Controlling and Lost Hardware Detecting through GSM
The project aims to develop various network utilities which are required to effectively monitor, control via GSM and to provide security to a LAN network. It aims to develop an integrated software solution that allows a...
AOMDV with improved Energy Function
Mobile computing is evolving rapidly with advances in wireless communications and wireless networking protocols. To facilitate communication, most wireless network devices are portable and battery-powered, and th...
Combating Sybil Attacks using SybilGuard
This paper presents a Sybil Guard, for combating against Sybil attacks without relying on a trusted central authority. Peer-to-peer and other decentralized, distributed systems are known to be particularly open to...
Personal Identification Using Palmprint Biometrics Based on Principal Line Approach
Palmprint is the one of the important biometrics characteristics with higher user acceptance. In palmprint, palm-lines are more important features for personal identification. In this paper, in preprocessing a Gaussian f...