Data Security using Cryptography and Steganography
نویسندگان
چکیده
منابع مشابه
Data Security Using Cryptography and Steganography Techniques
Although cryptography and steganography could be used to provide data security, each of them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the attacker will interrupt the transmission or make more careful checks on the data from the sender to the receiver. Steganography problem is that once the presence of hidden information is revealed or even suspected, th...
متن کاملAudio Steganography and Security Using Cryptography
Security is as strong as the weakest link. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. This paper presents the technique for the above requirement. In the proposed method, we use Steganography technique where secret message is embedded within a carrier audio file and the existence of message is hidden from the...
متن کاملSecuring Data by Using Cryptography with Steganography
Securing data is a challenging issue in today’s era. Most of the data travel over the internet and it becomes difficult to make data secure. So Cryptography was introduced for making data secure. But alone cryptography cannot provide a better security approach because the scrambled message is still available to the eavesdropper. There arises a need of data hiding. So here we are using a combina...
متن کاملInformation Security in Health Care Centre Using Cryptography and Steganography
As the volume of medicinal information stored electronically increase, so do the need to enhance how it is secured. The inaccessibility to patient record at the ideal time can prompt death toll and also well degrade the level of health care services rendered by the medicinal professionals. Criminal assaults in social insurance have expanded by 125% since 2010 and are now the leading cause of me...
متن کاملDouble Layer Security Using Visual Cryptography and Transform Based Steganography
With the recent advances in internet computing in our day to day life the need for communication has increased. Privacy in communication is desired when confidential information is shared between two parties. Mainly this project uses transform based steganography (DCT) and visual cryptography for hiding data. The proposed system provides double layer security. First level of security is achieve...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOSR Journal of Computer Engineering
سال: 2016
ISSN: 2278-8727,2278-0661
DOI: 10.9790/0661-180405130139