S. J. F. G. Sathiaraj, Grishma S. Pingale, Souvik Majumdar, Saniya Shaikh, B. Thakare
{"title":"结合密码学和隐写术的图像获取文本的安全传输","authors":"S. J. F. G. Sathiaraj, Grishma S. Pingale, Souvik Majumdar, Saniya Shaikh, B. Thakare","doi":"10.1109/ICAIT47043.2019.8987361","DOIUrl":null,"url":null,"abstract":"Information security is a matter of growing concern. The threats to data being transmitted over networks is increasing day by day. The data being transmitted is thus vulnerable to different types of attacks. Cryptography is a technique used to protect the data by converting it into an unintelligible form of text known as cipher text. On the other hand, steganography based algorithms have proved to be an efficient way of hiding the existence of essential data during transfer. The proposed method uses a combination of cryptography and steganography for encryption thereby increasing the level of security provided. The text is recognized from images and documents using a deep learning model and further encrypted using an improved encryption method and then hidden into an image using image steganography.","PeriodicalId":221994,"journal":{"name":"2019 1st International Conference on Advances in Information Technology (ICAIT)","volume":"233 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Secure Transfer of Image-Acquired Text Using a Combination of Cryptography and Steganography\",\"authors\":\"S. J. F. G. Sathiaraj, Grishma S. Pingale, Souvik Majumdar, Saniya Shaikh, B. Thakare\",\"doi\":\"10.1109/ICAIT47043.2019.8987361\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Information security is a matter of growing concern. The threats to data being transmitted over networks is increasing day by day. The data being transmitted is thus vulnerable to different types of attacks. Cryptography is a technique used to protect the data by converting it into an unintelligible form of text known as cipher text. On the other hand, steganography based algorithms have proved to be an efficient way of hiding the existence of essential data during transfer. The proposed method uses a combination of cryptography and steganography for encryption thereby increasing the level of security provided. The text is recognized from images and documents using a deep learning model and further encrypted using an improved encryption method and then hidden into an image using image steganography.\",\"PeriodicalId\":221994,\"journal\":{\"name\":\"2019 1st International Conference on Advances in Information Technology (ICAIT)\",\"volume\":\"233 \",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 1st International Conference on Advances in Information Technology (ICAIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAIT47043.2019.8987361\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 1st International Conference on Advances in Information Technology (ICAIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIT47043.2019.8987361","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure Transfer of Image-Acquired Text Using a Combination of Cryptography and Steganography
Information security is a matter of growing concern. The threats to data being transmitted over networks is increasing day by day. The data being transmitted is thus vulnerable to different types of attacks. Cryptography is a technique used to protect the data by converting it into an unintelligible form of text known as cipher text. On the other hand, steganography based algorithms have proved to be an efficient way of hiding the existence of essential data during transfer. The proposed method uses a combination of cryptography and steganography for encryption thereby increasing the level of security provided. The text is recognized from images and documents using a deep learning model and further encrypted using an improved encryption method and then hidden into an image using image steganography.