Steg Crypt (Encryption using steganography)
-
Published:2019-06-29
Issue:5s
Volume:8
Page:224-229
-
ISSN:2249-8958
-
Container-title:International Journal of Engineering and Advanced Technology
-
language:
-
Short-container-title:IJEAT
Author:
Gowda Naveen Chandra, ,Venkat P Sai,R Madhupriya,Prashanth Guru,Acharjee Raunak, , , ,
Abstract
The target of this venture is to obtain secured encryption and authentication using steganography. So as to accomplish this, numerous organizations & universities in the world have given solutions to secured communication, in the interim many algorithms have been created, including like AES, RSA, LSB etc. But though these algorithms have been developed they were endured to breakdown by hackers which make them obsolete. In this paper we try to combine many already existing algorithms like AES, LSB into one proposed system. Firstly, the utilization of steganography along with traditional encryption is implemented in the proposed system. Second, we try to achieve authentication of user using OTP via E-mail. Thirdly, the encrypted data is divided and sent across many servers so it’s impossible to get complete encrypted data in one path. By applying the proposed model, the probability of data compromise becomes very minimal and very hard to hack.
Publisher
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Subject
Computer Science Applications,General Engineering,Environmental Engineering
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献