International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 264

Review Papers | Electronics & Communication Engineering | India | Volume 5 Issue 12, December 2016 | Popularity: 6.7 / 10


     

Review of Designing Secured Data Using a Combination of LZW Compression, RSA Encryption, and DCT Steganography

Sayli S. Relekar, V. B. Raskar


Abstract: Now a days the use of internet has been increased very much. Confidential data is been exchange over internet and various media file are also been exchange over internet. To keep these confidential data and media file secure over internet, then the cryptography and steganography technique are used to secure the data. So in this paper we are use various cryptography technique and steganography technique. Cryptography technique is use to encrypt the data. Steganography technique is use to hide the data within the selected image. . For that, we first substitute the original message by using the fourteen square substitution algorithms. After the substitution of text, we then encrypt this text message using RSA algorithm. The encrypted message compressed by JPEG 2000 (Huffman coding) method, so it will reduce the size of the message that will be inserted and increase the capacity of messages that can be inserted. Messages that have been compressed and encrypted, is then hidden by DWT (Discrete Wavelet Transform) techniques. With the incorporation of encryption techniques, steganography, and compression, the acquired information is more secure and its capacity is larger. At the receivers end, same operations are performed to decrypt the original message in reverse order. It is found that here we are using the double ciphering techniques which makes the system very robust and secures it from known hacking attacks. It makes very difficult for the intruders to hack the image and then decrypt the message in a feasible amount of time thus securing it from many known network attacks.


Keywords: Encryption, steganography, cryptography, compression technique, RSA


Edition: Volume 5 Issue 12, December 2016


Pages: 1124 - 1126



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Sayli S. Relekar, V. B. Raskar, "Review of Designing Secured Data Using a Combination of LZW Compression, RSA Encryption, and DCT Steganography", International Journal of Science and Research (IJSR), Volume 5 Issue 12, December 2016, pp. 1124-1126, https://www.ijsr.net/getabstract.php?paperid=ART20163604, DOI: https://www.doi.org/10.21275/ART20163604



Similar Articles

Downloads: 1

Research Paper, Electronics & Communication Engineering, Egypt, Volume 10 Issue 12, December 2021

Pages: 1281 - 1287

Feature Level Fusion of Palmprint and Iris Images for Person Identification

May Essam, Fayez Wanis Zaki, Mervat El-Seddek

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Electronics & Communication Engineering, India, Volume 12 Issue 10, October 2023

Pages: 1195 - 1198

Streamlining VLSI Physical Design Engineering with SART: An Automated Tool for Data Extraction and Report Generation

Mamidi Vidhyasagar

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Electronics & Communication Engineering, India, Volume 11 Issue 7, July 2022

Pages: 474 - 477

Smart Electric Unit Measurement for Understanding Cost and Reducing Power in House Hold Applications

Anil Kumar V., Suhas V., Rithvik Shetty B., Sunil P.

Share this Article

Downloads: 10 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Electronics & Communication Engineering, India, Volume 12 Issue 10, October 2023

Pages: 2086 - 2090

Spintronics: A Revolution in Technology in Today's Era

Dr. Rakhi Dua, Dr. Puja Acharya, Dewansh Shekhar Singh

Share this Article

Downloads: 95

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2276 - 2281

Skin based Data hiding in Images by Using Haar and db2 DWT Techniques

Swapnali Zagade, Smita Bhosale

Share this Article
Top