DNA Based Cryptography and Steganography in Cloud Computing using Socket Programming
نویسندگان
چکیده
منابع مشابه
Data Security in Cloud Computing using Encryption and Steganography
Cloud Computing is a technology that readily makes available resources that otherwise may require huge amount of investment. Besides, it increases the availability of resources since anyone can access the data using web. But this advantage comes at a cost. Firstly, the data is uploaded unsecurely which has a high risk of being hacked by some malicious people. Secondly, the data saved at remote ...
متن کاملImage based steganography and cryptography
In this paper we describe a method for integrating together cryptography and steganography through image processing. In particular, we present a system able to perform steganography and cryptography at the same time using images as cover objects for steganography and as keys for cryptography. We will show such system is an effective steganographic one (making a comparison with the well known F5...
متن کاملCode Based Cryptography and Steganography
For a long time, coding theory was only concerned by message integrity (how to protect against errors a message sent via some noisely channel). Nowadays, coding theory plays an important role in the area of cryptography and steganography. The aim of this paper is to show how algebraic coding theory offers ways to define secure cryptographic primitives and efficient steganographic schemes.
متن کاملDouble Layer Security Using Visual Cryptography and Transform Based Steganography
With the recent advances in internet computing in our day to day life the need for communication has increased. Privacy in communication is desired when confidential information is shared between two parties. Mainly this project uses transform based steganography (DCT) and visual cryptography for hiding data. The proposed system provides double layer security. First level of security is achieve...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2018
ISSN: 2321-9653
DOI: 10.22214/ijraset.2018.5245