2012
DOI: 10.5121/ijcis.2012.2314
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Transmission Using Steganography and Encryption Technique

Abstract: With the spread of digital data around the world through the internet, the security of the data has raised a concern to the people. Many methods are coming up to protect the data from going into the hands of the unauthorized person. Steganography and cryptography are two different techniques for data security. The main purpose in cryptography is to make message concept unintelligible, while steganography aims to hide secret message. Digital images are excellent carriers of hidden information. We propose a meth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 21 publications
(58 reference statements)
0
3
0
Order By: Relevance
“…The AES method is modi ed to begin the process, and it is then wrapped up using steganography and placed within the cover picture. According to studies, the procedure begins with modi ed encryption using the AES technique and ends with steganography wrapping it into the cover picture [22]. Hence enhancing protection against threats [23].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The AES method is modi ed to begin the process, and it is then wrapped up using steganography and placed within the cover picture. According to studies, the procedure begins with modi ed encryption using the AES technique and ends with steganography wrapping it into the cover picture [22]. Hence enhancing protection against threats [23].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Generalization in qualitative research called transferability in the Indonesian language is called ketralihan. The point is that the results of qualitative research can be transferred or applied elsewhere, when the conditions of other places are not much different from the place of study [16], [17].…”
Section: Methods Of Researchmentioning
confidence: 99%
“…In the digital world, where most digital devices are interconnected, the use of cryptographic techniques is important to keep conversations, communications, and sensitive data secure [18], [19]. Cryptography is about transforming information into an unreadable message that helps prevent unauthorized access to confidential data and ensures that digital communication and data remain private and intact [20].…”
Section: A Confidentiality Integrity Authentication and Non-repudiati...mentioning
confidence: 99%