AN EFFICIENT APPROACH FOR REVERSIBLE DATA HIDING STEGANOGRAPHY COMBINED WITH CRYPTOGRAPHY
Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) (Vol.11, No. 06)Publication Date: 2020-06-30
Authors : Aditya Verma;
Page : 1320-1328
Keywords : RC4; Cryptography; Steganography; AES; RSA; Encryption Technique.;
Abstract
Information security is essential in preventing unauthorised access, destruction, or scrutiny of sensitive data. As multimedia information is being used in a variety of industries, it is crucial to protect the security of such sensitive data. Steganography, which includes obscuring information within other data without the cover information changing noticeably, is one method for protecting data. Contrarily, cryptography is an encryption method that turns data into an unreadable format known as a cypher. In terms of offering security, steganography and cryptography both have their own benefits and drawbacks. It is advantageous to combine cryptography and steganography to further increase security, resulting in a multi-layer security model. The suggested method tries to add an extra degree of protection by combining both techniques. The private data is encrypted with cryptography, and then steganography is used to hide it within another carrier of data. The information is kept secure even when being transmitted over a non-secure connection thanks to this combination strategy. The suggested work improves the security of sensitive data by utilising the advantages of steganography and cryptography. The information is jumbled and rendered unintelligible to unauthorised parties thanks to the encryption provided by cryptography. Steganography offers a further layer of camouflage at the same time, making the existence of buried information nearly unnoticeable. By combining these methods, a strong, multi-layered security model is created, making it more difficult for attackers to access or compromise the sensitive data. The proposed technique tries to combine steganography and cryptography to add an additional degree of security for private data. This combination strategy provides improved security and guarantees data transfer over insecure networks while preventing unauthorised access and maintaining data confidentiality.
Other Latest Articles
- SECURE ACCESS TO MEDICAL HEALTH RECORD THROUGH ATTRIBUTE BASED ENCRYPTION IN CLOUD
- TOWARDS A BETTER POLICY FOR AIRLINE PASSENGERS WITH REDUCED MOBILITY
- ANALYSIS OF THE RAIL CARGO TRANSPORT VOLUME IN POLAND IN 2010-2021
- RESULTS OF USING SUSTAINABLE AVIATION FUEL IN TRANSPORT AIRCRAFT ON DIFFERENT FLIGHT LEVELS AND THEIR INFLUENCE ON CARBON-DIOXIDE CO2 EMISSIONS
- HUMAN CAPITAL OPTIMUM UTILISATION IN DISASTER MANAGEMENT
Last modified: 2023-06-09 15:18:21