Secure Data Transmission Using Steganography

2018 Words5 Pages

Introduction :
These days internet is being used by people of different walks of life, who are facing more challenges in terms of data storage and transmission which in turn increases number of users in the network thereby considerably. In the advanced world, information is more essential of workstation interchanges and heart of worldwide economy. To guarantee the security of information, the idea of concealing has pulled in individuals to present an imaginative and innovative answers for secure information from falling into wrong hands. The dissemination of advanced media confronting an issue from numerous years as the information are struck and controlled by unapproved individual. The web is a strategy for correspondence as a method for appropriates data to the masses. As an effect of spreading the web around the globe, stowing away of secret messages through distinctive techniques is expanded. Step by step the data concealing strategies are expanding with more complex methodology. Pictures, features, content and so on are utilized within correspondence of mystery messages in advanced media. steganography and cryptography are distinctive sorts of strategies utilization to send secure information transmission. Steganography is the craftsmanship and art of concealing information into distinctive bearer records, for example, pictures, features, sound, content and so forth. In cryptography, there is parcel of degree to discover mystery message that we send by outsider (assaulter). Anyhow in steganography discovering mystery message is not that much simple. In this way, that just the sender and beneficiary realize that the message even exists. It doesn't pull in unwanted consideration. The mystery message that sender exchang...

... middle of paper ...

...orks Cited

Peter , Gregory. CISSP Guide to Security Essentials. (accessed May 1, 2014).
2. Jack Lacy, Schuyler R. Quackenbush, Amy Reibman, James H. Snyder, "Intellectual property protection systems and Digital Watermarking" , 2nd Information Hiding Workshop, 1998.(accessed May 1,2014).
3. Ross Anderson, Roger Needham, Adi Shamir, "The Steganographic File System", 2nd Information Hiding Workshop, 1998.(accessed May 1,2014).
4. Atul Kahate , “Cryptography and Network Security”, Third Edition.(accessed May 1,2014)
5. Neil F. Johnson, Sushil Jajodia, George Mason University, "Exploring Steganography: Seeing the Unseen", IEEE Computers, February 1998.(accessed May 1,2014).
6. "webopedia." http://www.webopedia.com/TERM/S/steganography.html (accessed May 1, 2014).
7. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.88.9413&rep=rep1&type=pdf (accessed May 1, 2014)

More about Secure Data Transmission Using Steganography

Open Document