INTERNATIONAL JOURNAL OF NOVEL RESEARCH AND DEVELOPMENT International Peer Reviewed & Refereed Journals, Open Access Journal ISSN Approved Journal No: 2456-4184 | Impact factor: 8.76 | ESTD Year: 2016
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 8.76 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
One of the preeminent challenges confronting the contemporary digital landscape pertains to the domain of Data Security, a pivotal facet within the realm of information technology. Given the substantial progressions in internet technology, there has been a profound surge in the transfer of voluminous textual and multimedia data across the digital expanse. However, the communication channel facilitating data transmission from sender to recipient is inherently susceptible to breaches.
In light of the paramount concern surrounding the security of electronic data, both public and private sectors conscientiously employ a diverse array of methodologies and techniques to safeguard information from unauthorized access. Notably, Cryptography and Steganography emerge as the foremost and extensively embraced technologies for ensuring heightened security.
Cryptography, characterized as the art of obfuscating information through encryption, serves to veil the intelligible and significant contents of the data. Simultaneously, Steganography, an adept technique, conceals the very existence of data within a cover medium. This concerted approach addresses the imperative need for both confidentiality and security in the digital milieu.
This paper introduces a security paradigm for safeguarding confidential data, amalgamating three distinct techniques. The initial facet involves image compression, utilizing wavelet transformation to compress the confidential image, thereby diminishing its size. The second facet employs cryptography, specifically relying on symmetric key encryption to obfuscate the confidential image. Lastly, the third facet adopts steganography, employing the least significant bit (LSB) to discreetly integrate the encrypted information within a cover image. Consequently, the overarching objective of this proposed technique is to attain a synthesis of heightened security measures and optimal quality in the reconstruction of the cover image.
Keywords:
Image Steganography; Pixel Value Difference (PVD); Encryption; Decryption; Advance encryption standard (AES)
Cite Article:
"Securing Data Using Cryptography and Steganography", International Journal of Novel Research and Development (www.ijnrd.org), ISSN:2456-4184, Vol.9, Issue 3, page no.a689-a695, March-2024, Available :http://www.ijnrd.org/papers/IJNRD2403076.pdf
Downloads:
00075
ISSN:
2456-4184 | IMPACT FACTOR: 8.76 Calculated By Google Scholar| ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 8.76 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator
Facebook Twitter Instagram LinkedIn