DATA SECURITY USING CRYPTOGRAPHY AND STEGNOGRAPHY 

Abstract

Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. The security of communication is a crucial issue on World Wide Web (internet) and within organizations. It is about confidentiality, integrity and authentication during access or editing of confidential internal documents. We are using a nonconventional steganography to increase security, which uses the cryptography to encrypt confidential message with the public and private keys. These keys are generated differently. Then loss-less compression takes place, which makes possible to hide larger amounts of information and documents using steganography. This paper presents a technique for constructing and implementing new algorithm based on embedding efficiently a large amount of data with high quality of encryption techniques, together with steganography, providing authentication and electronic documents integrity.  

Authors and Affiliations

Epuru Madhavarao, , Chikkala JayaRaju, , Pedasanaganti Divya, , A. S. K. Ratna

Keywords

Related Articles

Enhancement of the Security of a Digital Image using the Moduli Set

Digital images have found usage in many applications. These images may contain confidential information and need to be protected when stored on memory or transmitted over networks. Many techniques have been proposed...

Coordinated control ULTC power transformer with STATCOM for Voltage Control and Reactive Power Compensation 

The static synchronous compensator (STATCOM) is one type of FACTS devices which resembles in many respects a rotating synchronous condenser used for voltage control and reactive power compensation. The STATCOM...

Designing Authentication for Wireless Communication Security Protocol  

Security is considered an important issue for mobile communication systems. In particular, the design of authentication mechanisms has received considerable research interest recently. However, most of the curren...

A Survey of Performance based Secure Routing Protocols in MANET 

An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a...

An Unobservable Secure Routing Protocol against Wormhole and Black hole Attacks in MANET. 

Mobile ad-hoc network (MANET) is a selfconfiguring infrastructure-less network of mobile devices. The sensitive information such as mobility behavior should be kept private from adversaries in wireless environments...

Download PDF file
  • EP ID EP162068
  • DOI -
  • Views 84
  • Downloads 0

How To Cite

Epuru Madhavarao, , Chikkala JayaRaju, , Pedasanaganti Divya, , A. S. K. Ratna (2012). DATA SECURITY USING CRYPTOGRAPHY AND STEGNOGRAPHY . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(5), 319-325. https://europub.co.uk/articles/-A-162068