Survey on Encryption and Data Hiding for Secure Data Transmission
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
There are many possible ways to transmit data to destination. However one of the main issues with sending data over the internet is its security. In which the confidential data can be stolen or hacked in many ways. S o security of data is an important issue in transmission. Otherwise it affects the integrity confidentiality, or availability of the data. It is essential to protect data from unauthorized access. There are different encryption methods and data hiding techniques are used for secure data transmission. In this paper describes the different encryption and data hiding techniques for secure data transmission.
Authors and Affiliations
Dinbin Sunny, Ariya T. K.
Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy
Many photographic images that are published to particular interests. This makes it more and more copyright piracy of images. In this study will make a tools and methods that can be used to protect the copyright of th...
Streaming of High Quality videos using Cloud
Recently many mobile entertaining applications have been launched, but most popular app like Facebook, Twitter, YouTube have large demand among users. But these media applications are limited by the unstable wireless...
Detection of Precise C/C++ Memory Leakage by diagnosing Heap dumps using Inter procedural Flow Analysis statistics
Memory leak is a time consuming bug often created by C++ developers. Detection of memory leaks is often tedious. Things get worst if the code is not written by you, or if the code base is quite huge. The most difficu...
A System to Minimize The Storing And Managing Secret Keys Expense Using KAC
Emerging new computing technology cloud offering storage services. But now focus of data sharing with others in secure and efficient manner. For this the new expandable public-key cryptosystems which derives fixed-si...
Secure Authentication Schemes
There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical...