一种利用密码术和隐写术保证数据传输安全的方法

K. Manjula Shenoy, S. Shaikh
{"title":"一种利用密码术和隐写术保证数据传输安全的方法","authors":"K. Manjula Shenoy, S. Shaikh","doi":"10.1109/ICCES45898.2019.9002029","DOIUrl":null,"url":null,"abstract":"In this paper, an approach to transfer data securely is proposed. First, from the sender side, the data is encrypted using Rivest-Shamir-Adleman (RSA) algorithm and then this encrypted data is hidden using Least Significant Bit image steganography concept in a image of the web page and its url is sent to the receiver. Then, at the receiving end, the encrypted data is obtained that is hidden in the image of the web page whose url is sent. This encrypted data is decrypted using the same RSA algorithm. When the sender sends the data to the receiver and incase this data is obtained by the third person or an intruder he will see a URL being sent. Then he will open the URL and he will find a webpage, and he would not find any data being hidden. Then he will try to view the source code of the webpage, and then also he would not find any data being hidden. Thus, the intruder will be assured that no data is been hidden in this and chances are more that he would not go to decode it further. Hence, the chances of doubt an intruder can get that some confidential or private data is hidden in the data being sent is reduced. And hence, the data sent by the sender to the receiver is secured.","PeriodicalId":348347,"journal":{"name":"2019 International Conference on Communication and Electronics Systems (ICCES)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"An Approach to Secure Data Transmission Through the Use of Cryptography and Steganography\",\"authors\":\"K. Manjula Shenoy, S. Shaikh\",\"doi\":\"10.1109/ICCES45898.2019.9002029\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, an approach to transfer data securely is proposed. First, from the sender side, the data is encrypted using Rivest-Shamir-Adleman (RSA) algorithm and then this encrypted data is hidden using Least Significant Bit image steganography concept in a image of the web page and its url is sent to the receiver. Then, at the receiving end, the encrypted data is obtained that is hidden in the image of the web page whose url is sent. This encrypted data is decrypted using the same RSA algorithm. When the sender sends the data to the receiver and incase this data is obtained by the third person or an intruder he will see a URL being sent. Then he will open the URL and he will find a webpage, and he would not find any data being hidden. Then he will try to view the source code of the webpage, and then also he would not find any data being hidden. Thus, the intruder will be assured that no data is been hidden in this and chances are more that he would not go to decode it further. Hence, the chances of doubt an intruder can get that some confidential or private data is hidden in the data being sent is reduced. And hence, the data sent by the sender to the receiver is secured.\",\"PeriodicalId\":348347,\"journal\":{\"name\":\"2019 International Conference on Communication and Electronics Systems (ICCES)\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Communication and Electronics Systems (ICCES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCES45898.2019.9002029\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Communication and Electronics Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES45898.2019.9002029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

本文提出了一种安全传输数据的方法。首先,从发送方,数据使用Rivest-Shamir-Adleman (RSA)算法进行加密,然后使用最低有效位图像隐写术概念将加密的数据隐藏在网页图像中,并将其url发送给接收方。然后,在接收端获得加密后的数据,这些数据隐藏在发送url的网页的图像中。使用相同的RSA算法对加密的数据进行解密。当发送方将数据发送给接收方时,如果该数据被第三方或入侵者获得,他将看到正在发送的URL。然后他会打开URL,他会找到一个网页,他不会发现任何数据被隐藏。然后他会尝试查看网页的源代码,然后他也不会发现任何数据被隐藏。因此,入侵者将确信没有数据隐藏在其中,并且更有可能他不会进一步解码它。因此,入侵者怀疑某些机密或私有数据隐藏在正在发送的数据中的可能性降低了。因此,发送方发送给接收方的数据是安全的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
An Approach to Secure Data Transmission Through the Use of Cryptography and Steganography
In this paper, an approach to transfer data securely is proposed. First, from the sender side, the data is encrypted using Rivest-Shamir-Adleman (RSA) algorithm and then this encrypted data is hidden using Least Significant Bit image steganography concept in a image of the web page and its url is sent to the receiver. Then, at the receiving end, the encrypted data is obtained that is hidden in the image of the web page whose url is sent. This encrypted data is decrypted using the same RSA algorithm. When the sender sends the data to the receiver and incase this data is obtained by the third person or an intruder he will see a URL being sent. Then he will open the URL and he will find a webpage, and he would not find any data being hidden. Then he will try to view the source code of the webpage, and then also he would not find any data being hidden. Thus, the intruder will be assured that no data is been hidden in this and chances are more that he would not go to decode it further. Hence, the chances of doubt an intruder can get that some confidential or private data is hidden in the data being sent is reduced. And hence, the data sent by the sender to the receiver is secured.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Automated Library System Using Robotic Arm Road Crack Detection and Segmentation for Autonomous Driving Design and Simulation of Two Stage Sample and Hold Circuit with Low Power using Current Controlled Conveyor The PI Controllers and its optimal tuning for Load Frequency Control (LFC) of Hybrid Hydro-thermal Power Systems Low Power Hardware Based Real Time Music System and Digital Data Transmission Using FPGA
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1