DATA SECURITY USING CRYPTOGRAPHY AND STEGNOGRAPHY
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 5
Abstract
Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. The security of communication is a crucial issue on World Wide Web (internet) and within organizations. It is about confidentiality, integrity and authentication during access or editing of confidential internal documents. We are using a nonconventional steganography to increase security, which uses the cryptography to encrypt confidential message with the public and private keys. These keys are generated differently. Then loss-less compression takes place, which makes possible to hide larger amounts of information and documents using steganography. This paper presents a technique for constructing and implementing new algorithm based on embedding efficiently a large amount of data with high quality of encryption techniques, together with steganography, providing authentication and electronic documents integrity.
Authors and Affiliations
Epuru Madhavarao, , Chikkala JayaRaju, , Pedasanaganti Divya, , A. S. K. Ratna
A Comparative Study of Fuzzy & Genetic Power System Stabilizers and Role of Static Voltage Compensation on Power System stability
This paper describes the application of genetic and fuzzy logic Power System Stabilizer (PSS), for single line to ground and three phase faults, with/without static voltage compensator. The genetic and fuzzy PSSs a...
“AUTO MONITORING OF APPLIANCES BY INTERNET”
Under the heading it is abbreviated as ―Networked home appliance system using Bluetooth technology integrating appliance control/monitoring with Internet service‖ Here the monitoring and controlling of home appliance...
A Low-Quiescent Current Two- Input/Output Buffer with Class A-B Output Stage for LCD Driver
the evolution of compact, light-weight, low-power, and high-quality displays has caused a large demand for liquid crystal display (LCD) drivers, with features such as low cost, low power dissipation, high speed, an...
Routing Issues for Trust Based Framework in Mobile Ad Hoc Networks
The execution and survival of ad hoc networks depends on cooperative and trusting nature of the distributed nodes. There is a common assumption in the routing protocols that all nodes are trustworthy and cooperative....
MEMS ACCELEROMETER BASED HAND GESTURE RECOGNITION
This paper presents an MEMS accelerometer mostly based on gesture recognition algorithm and its applications. The hardware module consists of a triaxial mems accelerometer, microcontroller, and zigbee wireless...