A Comparative Study of Various Lossless Compression Techniques of Steganography and Cryptography

Vivek Kumar, Gursharan Singh, Balraj Singh
{"title":"A Comparative Study of Various Lossless Compression Techniques of Steganography and Cryptography","authors":"Vivek Kumar, Gursharan Singh, Balraj Singh","doi":"10.1109/ICCS54944.2021.00063","DOIUrl":null,"url":null,"abstract":"Data transaction is increasing day by day over internet which is resulting into a great challenge of their security. Data security had been a great matter of concern for which different technique like steganography, cryptography came into picture. These techniques are used to convert the data into unreadable format so that it can be protected from any kind of attack. However, the attackers are also updating themselves. Thus, the combination of various compression techniques has been implemented for higher security. In this paper, a study of various stenographic compression technique and combination of steganography and cryptography methods are reviewed and discussed in detail. The result of the analysis of various ideas helps in proposing a more complex and secure method. We come to a solution that, the combination of Huffman compression technique along with other compression technique and Cryptography is best suited for higher secrecy of data and less distortion in stegno image. Elliptical curve cryptography or public-key cryptography is also proposed for the better encryption of data and secrecy of key as well.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computing Sciences (ICCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCS54944.2021.00063","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Data transaction is increasing day by day over internet which is resulting into a great challenge of their security. Data security had been a great matter of concern for which different technique like steganography, cryptography came into picture. These techniques are used to convert the data into unreadable format so that it can be protected from any kind of attack. However, the attackers are also updating themselves. Thus, the combination of various compression techniques has been implemented for higher security. In this paper, a study of various stenographic compression technique and combination of steganography and cryptography methods are reviewed and discussed in detail. The result of the analysis of various ideas helps in proposing a more complex and secure method. We come to a solution that, the combination of Huffman compression technique along with other compression technique and Cryptography is best suited for higher secrecy of data and less distortion in stegno image. Elliptical curve cryptography or public-key cryptography is also proposed for the better encryption of data and secrecy of key as well.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
隐写和密码学中各种无损压缩技术的比较研究
网络上的数据交易日益增多,对网络的安全性提出了巨大的挑战。数据安全一直是人们非常关注的问题,因此隐写术、密码学等不同的技术出现了。这些技术用于将数据转换为不可读的格式,以便可以保护它免受任何类型的攻击。然而,攻击者也在更新自己。因此,为了实现更高的安全性,已经实现了各种压缩技术的组合。本文对各种速记压缩技术以及隐写与密码相结合的方法进行了详细的综述和讨论。对各种想法的分析结果有助于提出更复杂和更安全的方法。提出了一种将霍夫曼压缩技术与其他压缩技术和密码学相结合的解决方案,该方案最适合隐写图像中数据保密性高、失真小的要求。为了更好地实现数据的加密和密钥的保密性,还提出了椭圆曲线加密或公开密钥加密。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Empirical Analysis of Security Enabled Cloud Computing Strategy Using Artificial Intelligence Non-contact Methods for Heart Rate Measurement: A Review Towards a framework for Internet of Things and Its Impact on Performance Management in a Higher Education Institution Localizing Mobile Nodes in WSNs using Dragonfly Algorithm Comparative evaluation of machine learning classifiers with Obesity dataset
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1