Cryptographic-steganography network communication

R. Vijayan, R. S. Sreedivya
{"title":"Cryptographic-steganography network communication","authors":"R. Vijayan, R. S. Sreedivya","doi":"10.1109/ICPCSI.2017.8391802","DOIUrl":null,"url":null,"abstract":"Data security is vital for any firm as the automation of data transferring improves efficiency and productivity. The proposed software not only ensures data security but also serves as an important and effective tool in the efficient functioning of an organization. Besides protecting data while transferring it through the insecure channels, it also serves to maintain a highly useful database, which is of immense help when it comes to maintaining highly confidential documents, credit card details as well as employee records. The primary objective of this system is to protect confidential documents by implementing cryptographic techniques such as encryption and decryption. Cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. The proposed system will accept a data file or message as input and hide the contents in to a media file like an image as per user's choice; after that it will encrypt with a secure cryptographic algorithm like Rijndael. The resultant cipher output is sending to the receiver through any network. The same way recipient can decrypt the data using reverse engineering technique.","PeriodicalId":6589,"journal":{"name":"2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)","volume":"57 1","pages":"694-697"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICPCSI.2017.8391802","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Data security is vital for any firm as the automation of data transferring improves efficiency and productivity. The proposed software not only ensures data security but also serves as an important and effective tool in the efficient functioning of an organization. Besides protecting data while transferring it through the insecure channels, it also serves to maintain a highly useful database, which is of immense help when it comes to maintaining highly confidential documents, credit card details as well as employee records. The primary objective of this system is to protect confidential documents by implementing cryptographic techniques such as encryption and decryption. Cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. The proposed system will accept a data file or message as input and hide the contents in to a media file like an image as per user's choice; after that it will encrypt with a secure cryptographic algorithm like Rijndael. The resultant cipher output is sending to the receiver through any network. The same way recipient can decrypt the data using reverse engineering technique.
密码隐写网络通信
数据安全对于任何公司来说都是至关重要的,因为数据传输的自动化提高了效率和生产力。所建议的软件不仅可以确保数据安全,而且可以作为组织有效运作的重要和有效的工具。除了在通过不安全的渠道传输数据时保护数据外,它还可以维护一个非常有用的数据库,这在维护高度机密的文件、信用卡详细信息以及员工记录方面具有巨大的帮助。该系统的主要目标是通过实现加密和解密等加密技术来保护机密文件。密码学是单独保护消息内容的实践,隐写术涉及隐藏正在发送的秘密消息的事实,以及隐藏消息的内容。隐写术包括隐藏计算机文件中的信息。在数字隐写术中,电子通信可以包括传输层内的隐写编码,例如文档文件、图像文件、程序或协议。建议的系统将接受数据文件或消息作为输入,并根据用户的选择将内容隐藏到图像等媒体文件中;之后,它将使用Rijndael等安全加密算法进行加密。由此产生的密码输出通过任何网络发送给接收者。同样的方式,接收方可以使用反向工程技术解密数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信