Information Security and Data Hiding

Abstract

As the numbers of attacks increasing during transmission of information between the originate and target place, therefore need arises some secure methods which are free from different types of attacks. Two popular methods used for security purposes are Cryptography and Steganography. Both these methods transform data and information such that actual meaning of information is not visible. Hence these two methods provide integrity (correctness), confidentiality (privacy) and availability of information for indented recipients. In this paper, information security and data hiding system that is based on steganography and cryptography is proposed to secure data transfer between the source and destination. A LSB (Least Significant Bit) method is the easiest way of hiding information in an image and yet it is effective. The proposed system ensures the security of data being transferred.

Authors and Affiliations

Kavita

Keywords

Related Articles

A Research Paper on Optimum Energy in Household Refrigeration Cooling Systems

This thesis aims to produce comprehensive methodology for testing, modeling, performance analysis and optimization for small capacity absorption chillers. The data for chilled water, cooling water and hot water develops...

Ranking Approaches Based On Improving Aggregate Recommendation Diversity Algorithms

Recommender systems are becoming increasingly important to individual users and businesses for providing personalized recommendations. However, while the majority of algorithms proposed in recommender systems literature...

Liver Disease Prognosis Based on Clinical Parameters Using Machine Learning Approach

We are living in the era of Machine Learning. The use of Machine Learning in medical diagnosis of various diseases increases many fold in recent years. In this Paper we had made an attempt to demonstrate an analytical a...

A Review On Image Resolution Enhancement Techniques

Image resolution enhancement is one of the first steps in image processing. Image resolution enhancement is the process of manipulating an image so that resultant image is more suitable than the original one for specifi...

Efficient Clustering Technique for Information Retrieval in Data Mining

In the emerging new wave of applications where people are the ultimate target of text clustering methods, cluster labels are intended to be read and comprehended by humans. The primary objective of a clustering method s...

Download PDF file
  • EP ID EP24070
  • DOI -
  • Views 260
  • Downloads 9

How To Cite

Kavita (2017). Information Security and Data Hiding. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://europub.co.uk/articles/-A-24070