contact@ijirct.org      

 

Publication Number

IJIRCT1601033

 

Page Numbers

187-189

Paper Details

Network Security using StegoCrypt

Authors

Rudra J. Vivarekar, Nikita J. Kolhe, Darshana A. Mundada, Yogita G. Motiramani

Abstract

Information security plays a vital role in communication.
The threats to information security have been incrementing
at confounding rate. The most influential approaches
used against such threats are cryptography and steganography.
Cryptography and Steganography are two most popular ways
to secure data transmission. However, combination of these two
techniques results in appearing a highly secured method for data
communication. In the proposed system for cryptography, the
algorithm of substitution is based on Play Color Cipher and
asymmetric RSA algorithm is used to make Play Color Cipher
key in encrypted form. In steganography, encrypted key is hidden
using multimedia steganography technique.

Keywords

 

. . .

Citation

Network Security using StegoCrypt. Rudra J. Vivarekar, Nikita J. Kolhe, Darshana A. Mundada, Yogita G. Motiramani. 2017. IJIRCT, Volume 2, Issue 5. Pages 187-189. https://www.ijirct.org/viewPaper.php?paperId=IJIRCT1601033

Download/View Paper

 

Download/View Count

291

 

Share This Article