contact@ijirct.org      

Published In

Volume 2 Issue 5
April-2017

 

Paper Id

IJIRCT1601033

 

Page Number

187-189

 

Authors

  1. Rudra J. Vivarekar
  2. Nikita J. Kolhe
  3. Darshana A. Mundada
  4. Yogita G. Motiramani

 

Share This Article

Paper Details

Title

Network Security using StegoCrypt

Abstract

Information security plays a vital role in communication. The threats to information security have been incrementing at confounding rate. The most influential approaches used against such threats are cryptography and steganography. Cryptography and Steganography are two most popular ways to secure data transmission. However, combination of these two techniques results in appearing a highly secured method for data communication. In the proposed system for cryptography, the algorithm of substitution is based on Play Color Cipher and asymmetric RSA algorithm is used to make Play Color Cipher key in encrypted form. In steganography, encrypted key is hidden using multimedia steganography technique.

Key Words

Click here for Article Preview

 

. . .

Citation

Rudra J. Vivarekar, Nikita J. Kolhe, Darshana A. Mundada, Yogita G. Motiramani, "Network Security using StegoCrypt", IJIRCT, Volume 2, Issue 5, Pages 187-189, April-2017, https://www.ijirct.org/viewPaper.php?paperId=IJIRCT1601033

Download Paper

 

Print This Page

 

Download Counter

63