Data Transmission in network security is one of the foremost vital issues in today’s communication world. the end result of that’s that Data security has gained utmost importance because of the unprecedented increase within the data generated over the web, which could be a basic necessity of any application in information technology. The vigorous growth within the field of data communication has made information transmission much easier. But this kind of advancement has opened many possibilities of data being snooped. So, day-by-day maintaining of data security is becoming an inseparable part of computing and communication. In this report, we’ve got explored techniques that blend cryptography and steganography together. Steganography may be a specialty of science to manage and conceal a chunk of important information inside image, audio, video, or text documents. Steganography may be a method and study of composing a secret communication specified only the source and also the targeted beneficiary will realize the concealed information. the information concealed or covered process starts with the steganography method by identifying a network canopy and redundant parts, i.e. only permitted persons would be able to change without affecting the standard of that medium. The encoding method generates a Stego medium by substituting these redundant bits with the concealed message content. In this report, various approaches for information hiding using both cryptography and steganography is proposed keeping in mind two considerations-size of the encrypted object and degree of security. Here, signature image, text, audio information is kept hidden into a cover image using the private key of sender and receiver, which extracts the data from stego image employing a public key. This approach is often used for message authentication, message integrity, and non-repudiation purpose.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.