Loading [a11y]/accessibility-menu.js
A Proficient and secure way of Transmission using Cryptography and Steganography | IEEE Conference Publication | IEEE Xplore

A Proficient and secure way of Transmission using Cryptography and Steganography


Abstract:

People are concerned about the security of their data over the internet. The data can be protected in many ways to keep unauthorized individuals from accessing it. To sec...Show More

Abstract:

People are concerned about the security of their data over the internet. The data can be protected in many ways to keep unauthorized individuals from accessing it. To secure data, steganography can be used in conjunction with cryptography. It is common for steganography to be used for hiding data or secret messages, whereas cryptography encrypts the messages so that they cannot be read. As a result, the proposed system combines both cryptography and steganography. A steganographic message can be concealed from prying eyes by using an image as a carrier of data. In steganography, writing is done secretly or covertly. The digital steganography algorithm uses text, graphics, and audio as cover media. Due to recent advancements in technology, steganography is challenging to employ to safeguard private data, messages, or digital photographs. This paper presents a new steganography strategy for confidential communications between private parties. A transformation of the ciphertext into an image system is also performed during this process. To implement XOR and ECC (Elliptic Curve Cryptography) encryption, three secure mechanisms were constructed using the least significant bit (LSB). In order to ensure a secure data transmission over web applications, both steganography and cryptography must be used in conjunction. Combined techniques can be used and replace the current security techniques, since there has been an incredible growth in security and awareness among individuals, groups, agencies, and government institutions.
Date of Conference: 10-12 October 2022
Date Added to IEEE Xplore: 28 December 2022
ISBN Information:
Conference Location: Tashkent, Uzbekistan

I. Introduction

When sending personal data over the internet, data security is crucial. Copyright, ownership, and harmful data identification are all aided by steganography and stegan analysis tools. Steganography, which does not alter the content, is used to conceal sensitive data, and stegan analysis is used to unearth hidden material. In this article, we describe steganography, stegen analysis, and machine learning frameworks. It also demonstrates how the latter can be utilized to uncover buried textual information using steganographic methods. Today, secure communications are established using mathematical models in conjunction with cryptography and steganographic methods. Contrary to popular assumption, encryption only creates cipher text from plaintext, not concealing the existence of the data.

Contact IEEE to Subscribe

References

References is not available for this document.