Information Security and Data Hiding

Abstract

As the numbers of attacks increasing during transmission of information between the originate and target place, therefore need arises some secure methods which are free from different types of attacks. Two popular methods used for security purposes are Cryptography and Steganography. Both these methods transform data and information such that actual meaning of information is not visible. Hence these two methods provide integrity (correctness), confidentiality (privacy) and availability of information for indented recipients. In this paper, information security and data hiding system that is based on steganography and cryptography is proposed to secure data transfer between the source and destination. A LSB (Least Significant Bit) method is the easiest way of hiding information in an image and yet it is effective. The proposed system ensures the security of data being transferred.

Authors and Affiliations

Kavita

Keywords

Related Articles

slugDesign of Fractal Antenna For First Iteration

This paper describes the design and fabrication of modified Sierpinski carpet fractal antenna. The analysis took place between ranges of 0.5GHz to 3GHz. The fabricated modified Sierpinski carpet fractal antenna proves t...

The Future Scope of Business Intelligence (BI)

Business intelligence (BI) is a broad category of application on programs and technologies for gathering, storing, analyzing, and providing access to data to help enterprise users make better business decisions. BI appl...

Anaerobic digestion of Municipal Solid biodegradable wastes for methane production:A Review

The untreated and undisposed municipal solid waste generated through different sources is a major concern of the world now-a-days. There are millions of tonnes of municipal solid waste produced every year and the amount...

Special Rectangles and Narcissistic Numbers of Order 3 And 4

We search for infinitely many rectangles such that x2  y2  3A  S 2  k2  SK  Narcissistic numbers of order 3 and 4 respectively, in which x, y represents the length and breadth of the rectangle. Also the total num...

Rainfall-Runoff Modeling using Multiple Linear Regression Technique

In this paper MLR model was developed to model the rainfall-runoff process. The main objective of this study is to prove that MLR can be successfully used as R-R models. It is for this reason that various MLR models wer...

Download PDF file
  • EP ID EP24070
  • DOI -
  • Views 268
  • Downloads 9

How To Cite

Kavita (2017). Information Security and Data Hiding. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://europub.co.uk/articles/-A-24070