Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6366
Title: Security Extensibility in Data Transfer Combining Cryptography and Steganography
Authors: Rana, Nitika
Sharma, Shipra
Sood, Meenakshi [Guided by]
Keywords: Security extensibility
Data transfer
Cryptography
Steganography
Issue Date: 2015
Publisher: Jaypee University of Information Technology, Solan, H.P.
Abstract: The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data from source to destination. At the same time is easy to modify and misuse the valuable information through hacking. Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. There are often cases when it is not possible to send messages openly or in encrypted form. This is where Steganography can come into play. Steganography can be viewed as akin to cryptography. Both have been used throughout recorded history as means to protect information. While cryptography provides privacy, Steganography is intended to provide secrecy. Cryptographic cipher is used before hiding text to make this procedure more secure. Cryptographic technique is one of the principal means to protect information security. Not only has it to ensure the information confidential, but also provides digital signature, authentication, secret sub-storage, system security and other functions. Therefore, the encryption and decryption solution can ensure the confidentiality of the information, as well as the integrity of information and certainty, to prevent information from tampering, forgery and counterfeiting. This project deals with hiding of encrypted text behind a digital image, to ensure both privacy and secrecy. Encryption is done with the help of RSA encrypt/decrypt algorithm, on the other hand for Steganography; we have proposed and implemented a new technique which is an enhancement to conventional LSB technique.
URI: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6366
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Security Extensibility in Data Transfer Combining Cryptography and Steganography.pdf1.38 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.