An Approach to Secure Larger Size Data with Authenticity and Integrity

نویسندگان

  • Sanjive Tyagi
  • Ajay Agarwal
  • Ramveer Singh
  • Radha Govind
چکیده

The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. The security of communication is a crucial issue on World Wide Web (internet) and within organizations. It is about confidentiality, integrity and authentication during access or editing of confidential internal documents. We are using a nonconventional steganography to increase security, which uses the cryptography to encrypt confidential message with the public and private keys. These keys are generated differently. Then loss-less compression takes place, which makes possible to hide larger amounts of information and documents using steganography. This paper presents a technique for constructing and implementing new algorithm based on embedding efficiently a large amount of data with high quality of encryption techniques, together with steganography, providing authentication and electronic documents integrity. Keywords— Cryptography, Stegnography, Authentication, Integrity, Image File.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Overview on Edible Oils with Integrity Approach

The issue of the integrity of edible oils and fats can be considered in three main areas of safety, authenticity and quality in accordance with the standardization approach. Safety is the most essential part of the food, including edible oils, due to effects on health of consumers. Authenticity equivalent to purity is also an important aspect of this approach. The nature and prevention of fraud...

متن کامل

Pathological Study and Evaluation of Integrity and Authenticity of Tamghachiha Neighborhood in Kashan

Tamghachiha is one of the historic neighborhoods of Kashan, which has a special place in the historic urban area because of being located next to essential elements of the city such as Suq Gate and Bazaar, as well as the existence of valuable buildings. This neighborhood has been damaged due to urban changes such as urban development, new constructions, and especially the construction of Bab al...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010