IJMTES – Paper Presented in: ‘2 day State Level workshop on Cyber Fest 17’, conducted by: ‘Department of Computer Engineering, Marathwada Mitra Mandal College of Engineering, Pune’ on 22-23 Feb 2017

Journal Title : International Journal of Modern Trends in Engineering and Science

Paper Title : DATA SECURITY USING CRYPTO STEGANOGRAPHIC TECHNIQUE

Author’s Name : Omkar Kulkarni | Mrunal Shende | Akanksha Hundoo | Bharat Mazire | Prof Harmeet Khanujaunnamed

Paper Presented in : ‘2 day State Level workshop on Cyber Fest 17’, conducted by: ‘Department of Computer Engineering, Marathwada Mitra Mandal College of Engineering, Pune’ on 22-23 Feb 2017

Volume 04 Issue 05 2017

ISSN no:  2348-3121

Page no: 69-71

Abstract – As world is moving toward more digitalization, security is becoming a major issue. Security may be achieved at a particular level according to the requirement. Data security is one of the important concerns. Cryptography and Steganography techniques can be used to achieve data security. In cryptography, various encryption algorithms can be used to convert plain text into cipher text. Steganography algorithms are used to hide the data behind an image or audio or video. To achieve high level of data security, the combination of both i.e. cryptography and steganography can be used.

Key words— RSA, Steganography, Encryption, Data Security

References

  1. Mr.Falesh M. Shelke1, Miss. Ashwini A. Dongre2, Mr. Pravin D. Soni31,2M.E. 2nd Sem, Department of computer science and engineering, P.R. Patil college of engineering, Amravati, India,Prof.Department of computer science and engineering, P.R. Patil college of engineering, Amravati, India “Comparison of different techniques for Steganography in images” Volume 3, Issue 2, February 2014.
  2. Syeda Musfia Nasreen , Gaurav Jalewal, Saurabh Sutradha “A Study on Video Steganographic Techniques” Volume 05 Issue ,10 October- 2015
  3. A.E. Mustafa, A.M.F ElGamal,M.E. ElAlmi, Ahmed.BD,”A Proposed Algorithm For Steganography In Digital Image Based on Least Significant Bit”,Research Journal Specific Education Faculty of Specific Education Mansoura University Issue No. 21, April. 2011.
  4. Nentawe Y. Goshwe. Department of Electrical/Electronics Engineering University of Agriculture, Makurdi “Data Encryption and Decryption Using RSA Algorithm in a Network Environment ”IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.7, July 2013.
  5. Anil Kumar * , Rohini Sharma Department of IT, M.M.E.C., Maharishi Markandeshwar University (MMU), Mullana, India “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique ” , International Journal of Advanced Research in Computer Science and Software Engineering,Volume 3, Issue 7, July 2013.
  6. Saranya1 , Vinothini2 , Vasumathi3 1& 2Research Scholar, Department of Computer Science, PGP college of Arts & Science, Namakkal, Tamilnadu, India 3 Assistant Professor, Department of Computer Science, PGP college of Arts & Science, Namakkal, Tamilnadu, India “A Study on RSA Algorithm for Cryptography ”Saranya et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4) , 2014, 5708-5709
Scroll Up