G. D. Reddy, Yaddanapudi Vssrr Uday Kiran, Prabhdeep Singh, Shubhranshu Singh, Sanchita Shaw, Jitendra Singh
{"title":"使用密码学和隐写术的一种熟练和安全的传输方式","authors":"G. D. Reddy, Yaddanapudi Vssrr Uday Kiran, Prabhdeep Singh, Shubhranshu Singh, Sanchita Shaw, Jitendra Singh","doi":"10.1109/ICTACS56270.2022.9988094","DOIUrl":null,"url":null,"abstract":"People are concerned about the security of their data over the internet. The data can be protected in many ways to keep unauthorized individuals from accessing it. To secure data, steganography can be used in conjunction with cryptography. It is common for steganography to be used for hiding data or secret messages, whereas cryptography encrypts the messages so that they cannot be read. As a result, the proposed system combines both cryptography and steganography. A steganographic message can be concealed from prying eyes by using an image as a carrier of data. In steganography, writing is done secretly or covertly. The digital steganography algorithm uses text, graphics, and audio as cover media. Due to recent advancements in technology, steganography is challenging to employ to safeguard private data, messages, or digital photographs. This paper presents a new steganography strategy for confidential communications between private parties. A transformation of the ciphertext into an image system is also performed during this process. To implement XOR and ECC (Elliptic Curve Cryptography) encryption, three secure mechanisms were constructed using the least significant bit (LSB). In order to ensure a secure data transmission over web applications, both steganography and cryptography must be used in conjunction. Combined techniques can be used and replace the current security techniques, since there has been an incredible growth in security and awareness among individuals, groups, agencies, and government institutions.","PeriodicalId":385163,"journal":{"name":"2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Proficient and secure way of Transmission using Cryptography and Steganography\",\"authors\":\"G. D. Reddy, Yaddanapudi Vssrr Uday Kiran, Prabhdeep Singh, Shubhranshu Singh, Sanchita Shaw, Jitendra Singh\",\"doi\":\"10.1109/ICTACS56270.2022.9988094\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"People are concerned about the security of their data over the internet. The data can be protected in many ways to keep unauthorized individuals from accessing it. To secure data, steganography can be used in conjunction with cryptography. It is common for steganography to be used for hiding data or secret messages, whereas cryptography encrypts the messages so that they cannot be read. As a result, the proposed system combines both cryptography and steganography. A steganographic message can be concealed from prying eyes by using an image as a carrier of data. In steganography, writing is done secretly or covertly. The digital steganography algorithm uses text, graphics, and audio as cover media. Due to recent advancements in technology, steganography is challenging to employ to safeguard private data, messages, or digital photographs. This paper presents a new steganography strategy for confidential communications between private parties. A transformation of the ciphertext into an image system is also performed during this process. To implement XOR and ECC (Elliptic Curve Cryptography) encryption, three secure mechanisms were constructed using the least significant bit (LSB). In order to ensure a secure data transmission over web applications, both steganography and cryptography must be used in conjunction. Combined techniques can be used and replace the current security techniques, since there has been an incredible growth in security and awareness among individuals, groups, agencies, and government institutions.\",\"PeriodicalId\":385163,\"journal\":{\"name\":\"2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS)\",\"volume\":\"109 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTACS56270.2022.9988094\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTACS56270.2022.9988094","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Proficient and secure way of Transmission using Cryptography and Steganography
People are concerned about the security of their data over the internet. The data can be protected in many ways to keep unauthorized individuals from accessing it. To secure data, steganography can be used in conjunction with cryptography. It is common for steganography to be used for hiding data or secret messages, whereas cryptography encrypts the messages so that they cannot be read. As a result, the proposed system combines both cryptography and steganography. A steganographic message can be concealed from prying eyes by using an image as a carrier of data. In steganography, writing is done secretly or covertly. The digital steganography algorithm uses text, graphics, and audio as cover media. Due to recent advancements in technology, steganography is challenging to employ to safeguard private data, messages, or digital photographs. This paper presents a new steganography strategy for confidential communications between private parties. A transformation of the ciphertext into an image system is also performed during this process. To implement XOR and ECC (Elliptic Curve Cryptography) encryption, three secure mechanisms were constructed using the least significant bit (LSB). In order to ensure a secure data transmission over web applications, both steganography and cryptography must be used in conjunction. Combined techniques can be used and replace the current security techniques, since there has been an incredible growth in security and awareness among individuals, groups, agencies, and government institutions.