Downloads: 128 | Views: 247
Research Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 10, October 2017 | Popularity: 6.8 / 10
Preserve the Confidentiality of Information in E-government Through Steganography Based on AES technique and Unicode Standard
Abdulrahman Ahmed Alzand, Omar Hisham Rished
Abstract: Government basically alludes to give proficient, advantageous and transparent services to residents and business through data and communication technology. Governance is an option structure to the conventional perspective of government. One of the fundamental tasks of e-government is the transmission of private data from conventional to computerize on the PC systems. Albeit every e-government has its own systems and government can't deny utilizing Internet. In any case, to ensure data is prime worry for e-government and secure them with the web assaults since Internet is making a borderless world. Data security implies ensuring data and data frameworks from unapproved get to, utilize, revelation, interruption, alteration, scrutiny, investigation, recording or demolition. Data security is a set joining authoritative security and IT security. This paper concentrates on the most proficient method to secure data utilizing steganography. As steganography is solid information concealing strategy, by utilizing it is extremely helpful to shroud information as well as accommodating in character get to administration. The strategy is created to conceal the secret information with the specific picture. It is useful in security of data, exactness and straightforwardness among subjects. The paper additionally concentrates on the provisos of other information concealing method called cryptography. As data security is a prime worry in online world, it pulls in light of a legitimate concern for scientists to grow new systems and consistent assessment of it.
Keywords: Cryptography, Advance encryption standard AES, Steganography, Unicode Standard
Edition: Volume 6 Issue 10, October 2017
Pages: 797 - 802
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 1362 - 1373Design and Implementation of a Novel Hybrid Quantum-Classical Processor for Enhanced Computation Speed
Mohammed Saleem Sultan, Mohammed Shahid Sultan
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1349 - 1363IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing
Ponnarasan Krishnan