Information Security and Data Hiding

Abstract

As the numbers of attacks increasing during transmission of information between the originate and target place, therefore need arises some secure methods which are free from different types of attacks. Two popular methods used for security purposes are Cryptography and Steganography. Both these methods transform data and information such that actual meaning of information is not visible. Hence these two methods provide integrity (correctness), confidentiality (privacy) and availability of information for indented recipients. In this paper, information security and data hiding system that is based on steganography and cryptography is proposed to secure data transfer between the source and destination. A LSB (Least Significant Bit) method is the easiest way of hiding information in an image and yet it is effective. The proposed system ensures the security of data being transferred.

Authors and Affiliations

Kavita

Keywords

Related Articles

Survey on Efficient Control Algorithm in Cloud for Cost Elaboration

Cloud computing is a new paradigm for delivering remote computing resources through a network. However, achieving an energy-efficiency control and simultaneously satisfying a performance guarantee have become critical i...

Advanced Li-Fi Technology for Data and Voice Transmission with Device Control

Now a days, Data transmission without using any network is very tedious job to do. In this paper, data and audio is transmitted and gotten through visible lights and control the devices. The data is generated by PC1 the...

A Review on Pyrolysis of Protein Rich Microalgae Biomass

The population explosion and rapid urbanization currently being experienced in both the developed and developing economies of the world calls for enormous quantities of fuel and this high rate of fuel consumption is hea...

Analysis and Optimization of Level Cache

The focus of this paper is to depict the field of computer architecture, researchers compare architectures by simulating them on a common platform with common benchmark programs. This paper accomplished the following ob...

Friendbook: Semantic Based Friendship

Now a day’s friend recommendation has a greater impact on social networking. Friend recommendation based on social graph may not be most relevant to reflect user’s expectation on friend selection. Propose approach Based...

Download PDF file
  • EP ID EP24070
  • DOI -
  • Views 280
  • Downloads 9

How To Cite

Kavita (2017). Information Security and Data Hiding. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://www.europub.co.uk/articles/-A-24070