Four key Secured Data Transfer Using Steganography and Cryptography
نویسنده
چکیده
Steganography and cryptography are used to send the data in a confidential way. Steganography hides the existing message and cryptography will confuse the message. The transformation of plain text to cipher text is called as encryption. The transformation of cipher text to plain text is called decryption. Encryption and decryption are controlled by keys. Hashing, symmetric and asymmetric algorithms are cryptographic techniques. There is a difficulty to find the hidden messages. For this purpose various transformations like DCT, FFT, FFT, and 2DDCT are used. A system is proposed in this paper to develop a new technique along with a newly enhanced security model in which cryptography and Steganography are used. In cryptography DES algorithm is used to encrypt a message and part of the message is hidden in 2DDCT of an image and the rest of the message will generate two secrete keys for the generation if high security.
منابع مشابه
A Novel Approach for Concealed Data Sharing and Data Embedding for Secured Communication
This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid ...
متن کاملA new horizon in data security by Cryptography & Steganography
Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. In Steganography, various techniques in different domains like spatial domain, frequency domain etc are avai...
متن کاملA Hybrid Model for Secure Data Transfer in Audio Signals using HCNN and DD DWT
In today’s world, there are a number of cryptographic and steganography techniques used in order to have secured data transfer between a sender and a receiver. In this paper a new hybrid approach that integrates the merits of cryptography and audio steganography is presented. First, the original message is encrypted using chaotic neural network and the resultant cipher text is embedded into a c...
متن کاملTwo New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions
The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret’s very existence is concealed. The term ‘Steganography’ describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This paper introduces two new methods wherein cryptography and steganography...
متن کاملSome New Methodologies for Image Hiding using Steganographic Techniques
Security and memory management are the major demands for electronics devices like ipods, cell phones, pmps, iphones and digital cameras. In this paper, we have suggested a high level of security mechanism by considering the concept of steganography along with the principle of cryptography. Four different methods that can save a considerable amount of memory space have been discussed. Based on t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013