A Novel Approach For Data Hiding In Web Page Steganography Using Encryption With Compression Based Technique
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
Abstract: Cryptography, Steganography and Watermarking are three rudimentary techniques which will avail us to secure data from unauthorized access. Steganography is one of the best techniques to obnubilate messagefrom unauthorized users. It is utilized to obnubilate data through sundry medium like audio, video, Text and image. In our research work, we fixate on text Steganography through html web pages to obnubilate data behind it. Because html pages are facilely transferable that contains secret data behind it. There are sundry methods of web pages predicated Steganography. Some of the mundane methods are white spaces, order of attributes, change case letter, change quotation marks, reiterate attributes to obnubilate data etc. But these allmethods have some inhibition like iota of data can be obnubilated behind html page & do not have most sizably voluminous embedding capacity etc. To surmount or enhance these circumscriptions we optate to apply anycompression technique afore embedding process so that it can obnubilate substantial amount of data and secondly security is much more consequential thus we have to apply any encryption techniques so that data cannot transferable in its pristine form. Thus in our research work we fixates on embedding techniques, compression and encryption techniques. So that system will be more power full as well as secure.
Authors and Affiliations
Ram Krishna Singh , Bhavya Alankar
Big data
Abstract: Big data refers to huge chunks of data that are very large and complex for it to be processed or analyzed by traditional methods. Initially, this enormous amounts of data brought about major challenges concerni...
Analysis and Implementation of Selective Image Encryption Technique Using Matlab
Abstract: Encryption plays a very significant role in secure transmission of digital images from one place to another. There are a number of encryption algorithms available which perform the task of encryption. How...
Limitations of Network Security for Enabling Application Access
Preamble Review of Autonomous Wheelchair Control Mechanism
Intelligent Wheelchair (IW) interface is used for providing more convenient and efficient interface to the people with disability. Robotic wheelchairs extend the capabilities of traditional powered devices by intro...
Survey Paper on PEGASIS: Energy Conservation in Heterogeneous Environment
Abstract: Wireless sensor network is vast area for research. Because of scarce resources, energy consumption and battery lifetime is crucial aspects in WSN. So with the help of routing protocol, improvement can be...