Adaptive Steganography Based Enhanced Cipher HidingTechnique for Secure Data Transfer
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract:There have been enormous number of attacks recorded during electronic transmission of informationbetween the source and intended receiver and indeed this has called for a more robust and efficient method forsecured data transfer and making it more credible. Cryptography and Steganography are the widely usedtechniques that manipulates and conceal the information in order to cipher and hide their existence. These twotechniques share the common goals and services of shielding the confidentiality, integrity andprevent the accessof information by unauthorized users. In this project, a data hiding system which is grounded on audiosteganography and cryptography is proposed for authenticateddata transfer. Steganographic medium used inthis project is the audio medium. The encryption and decryption methods of cryptography used in developingthis system make the surety of the proposed system more efficient in securing the data from unauthorized access.The system thus proposed is therefore recommended for use by the Internet users for founding a more safe andsecure system. In this project, an audio medium is used as the steganographic and an advanced algorithm isapplied for encoding the private data into the audio file.The goal of this research is to combine bothcryptography and steganography in order to develop a better and credible communication in this unsecuredopen network.
Authors and Affiliations
Sudipta Sahana , Goutami Dey , Madhurhita Ganguly , Priyankar Paul , Subhayan Paul
Wireless Sensor Grids Energy Efficiency Enrichment UsingQuorum Techniques
Abstract: Wireless sensor networks are mainly considered for atmosphere reconnaissance, wherein wirelesssensor nodes collaborate to get their work done. Generally, wireless sensors are battery powered; therefore, i...
Seminar and Project Manager and Resourceful Trainer(SMART)
This paper presents an approach to eradicate all of the confusion which surrounds anyone while preparing for the project and seminar. Also it aims in helping the institution to manage the previous batch’s semin...
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Example
Internet banking has gained wide acceptance internationally and seems to be fast catching up in India with more and more banks entering the fray. online banking is defined as the use of Internet as a remote  ...
Detection and Prevention of Selfish Attack in MANET using Dynamic Learning
Abstract: In this paper we deal with misbehaving nodes in mobile ad hoc networks (MANETs) that drop packets supposed to be relayed, whose purpose may be either saving their resources or launching a DoS attack. We propose...
Smart Blood Bank as a Service on Cloud
Abstract: We all know the working of blood bank management system. A blood bank is a cache or bank of blood or blood components, gathered as a result of blood donation or collection, stored and preserved for later use in...