Posted Date : 07th Mar, 2025
Peer-Reviewed Journals List: A Guide to Quality Research Publications ...
Posted Date : 07th Mar, 2025
Choosing the right journal is crucial for successful publication. Cons...
Posted Date : 27th Feb, 2025
Why Peer-Reviewed Journals Matter Quality Control: The peer revie...
Posted Date : 27th Feb, 2025
The Peer Review Process The peer review process typically follows sev...
Posted Date : 27th Feb, 2025
What Are Peer-Reviewed Journals? A peer-reviewed journal is a publica...
Secure Data Encryption and Decryption Using Crypto-Stego
Author Name : Shreesh Dutta Bajpa, Garvit Sharma, Priyanshi Sharma, Anil Kumar
DOI: https://doi.org/10.56025/IJARESM.2022.1010381
ABSTRACT
Getting information encryption and unscrambling utilizing Cryptography and Steganography procedures. Because of late improvements in stego examination, giving security to individual items, messages, or computerized pictures utilizing steganography has become troublesome. By utilizing stego investigation, one can undoubtedly uncover presence of stowed away data in transporter records. This venture presents a novel steganographic approach for correspondence between two private gatherings. The methodology presented in this undertaking utilizes both steganographic as well as cryptographic procedures. In Cryptography we are using RSA. In Steganography we are using Image Steganography for hiding the data. And we also use Mutual Authentication process to satisfy all services in Cryptography i.e., Access Control, Confidentiality, Integrity, Authentication. In this way we can maintain the data more securely. Since we use RSA algorithm for securing the data and again on this we perform Steganography to hide the data in an image. Such that any other person in the network cannot access the data present in the network. Only the sender and receiver can retrieve the message from the data.