Collaboration of Cryptography and Steganography for Enhanced Security: A Review
Journal Title: International Journal of Engineering and Science Invention - Year 2018, Vol 7, Issue 8
Abstract
Today most of the communication takes place through web and people are using internet for every day communication. Because of the large advancements in Internet Technology the indispensable need of security for protection of data from the assorted hackers also rises. Cryptography and Steganography both are widely used techniques for secured data transmission. Where Cryptography is a technique which distorts a message and Steganography hides the message/data. For Encryption of secret message we will use AES and then image will be embedded using LSB algorithm which carries our confidential data. The amalgamation of both AES and LSB algorithms will take place to grant Security with confidentiality during communication of the secret data. The main objective of the paper is to assign security levels in the secret data which needs to be converse through the cover image. From the review of literature it is found that there is need to offer confidentiality to the secret message/data by merging the Cryptographic Techniques in Steganography.
Authors and Affiliations
Swati Nagpal, Ritu Nagpal
Collaborative Approach In Distributed Software Systems
Distributed and Collaborative software development, today is highly researched concepts. In distributed software development several software development teams work over the same software project across different geograp...
Integral Solutions of Non-Homogeneous Biquadratic Diophantine Equation x4 - y4 = 34 (z + w) p2 With Five Unknowns
The non-homogeneous biquadratic Diophantine equation given by 2 is analyzed for its patterns of non-zero distinct integral solutions. A few interesting relations between the solutions and special polygonal numbers are ex...
Mathematical Model for Selective Message Forwarding Schemes Using Stochastic Methods
This Paper Represents Developing Of Selective Message Forwarding Schemes On Stochastic Tools . The Schemes Will Depend On Parameters Such As The Available Battery At The Node, The Energy Cost Of Retransmitting A Message....
Exploration Tool for Instruction Memory Organisations Based On Accurate Cycle-Level Energy Modelling
The plan of current implanted frameworks is obliged by the necessities of present day installed applications. A considerable lot of these applications require not just supported operation for drawn out stretches of time,...
Study And Analysis Of Hadoop Based Network Intrusion Detection System.
Network security is a paramount concern for the organization. To secure the network, we have traditional network intrusion detection systems and firewalls but they have limitations like size of training data sets .With t...