{"title":"基于图像隐写术的云信息安全","authors":"Muhammad Amjad Khan","doi":"10.54692/lgurjcsit.2021.0501171","DOIUrl":null,"url":null,"abstract":"Cloud computing is getting involved in almost every technological field to serve customers in a more efficient way. The shared resources (pool) with different configurations according to the user’s needs are provided by cloud vendors. Users stores their data on the cloud, data can be personal, or organizational, and data of every type must be secure on clouds. Making the data secure and reducing the integrity of data during transfer through public channels. In this paper, we will try to make data secure using image steganography. Using the steganography technique, we use encryption-decryption of data into images and make data invisible.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"33 11","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Information Security for Cloud using Image Steganography\",\"authors\":\"Muhammad Amjad Khan\",\"doi\":\"10.54692/lgurjcsit.2021.0501171\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing is getting involved in almost every technological field to serve customers in a more efficient way. The shared resources (pool) with different configurations according to the user’s needs are provided by cloud vendors. Users stores their data on the cloud, data can be personal, or organizational, and data of every type must be secure on clouds. Making the data secure and reducing the integrity of data during transfer through public channels. In this paper, we will try to make data secure using image steganography. Using the steganography technique, we use encryption-decryption of data into images and make data invisible.\",\"PeriodicalId\":197260,\"journal\":{\"name\":\"Lahore Garrison University Research Journal of Computer Science and Information Technology\",\"volume\":\"33 11\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-02-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Lahore Garrison University Research Journal of Computer Science and Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.54692/lgurjcsit.2021.0501171\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Lahore Garrison University Research Journal of Computer Science and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54692/lgurjcsit.2021.0501171","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information Security for Cloud using Image Steganography
Cloud computing is getting involved in almost every technological field to serve customers in a more efficient way. The shared resources (pool) with different configurations according to the user’s needs are provided by cloud vendors. Users stores their data on the cloud, data can be personal, or organizational, and data of every type must be secure on clouds. Making the data secure and reducing the integrity of data during transfer through public channels. In this paper, we will try to make data secure using image steganography. Using the steganography technique, we use encryption-decryption of data into images and make data invisible.