ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Enhancing Security through Data Hiding

Journal: International Journal of Advanced Scientific Research & Development (IJASRD) (Vol.03, No. 01)

Publication Date:

Authors : ; ;

Page : 126-133

Keywords : AES; RDH (Reversible Data Hiding); Stegnography; Cover Image.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The use of computer networks for data transmissions has created the need of security. The security of this interactive media information can be done with encryption or data hiding algorithms. To decrease the transmission time, the data compression is necessary. Since few years, a problem is to try to combine compression, encryption and data hiding in a single step. Image security becomes increasingly important for many applications, e.g., confidential transmission, video surveillance, military and medical applications. Nowadays, the transmission of images is a daily routine and it is necessary to find an efficient way to transmit them over networks. They send Secret message over channel using Cryptography and Steganography algorithms by AES (Advanced Encryption Standard). It is used to encrypt the data from plain text to cipher text vice versa. There are two types of keys available in the cryptography, symmetric and asymmetric. There are using symmetric key which is divided into two key such as private and public key. Public key is used for encryption and private key is used for decryption. The reversible data hiding technique is used to retrieve the data and image separately and securely. By using three types of keys it is more secure than other techniques. Steganography is the technique which is used in cryptography for more secure purpose. They are using local host path for data transmission.

Last modified: 2019-02-11 03:17:42