International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 128 | Views: 247

Research Paper | Computer Science & Engineering | Iraq | Volume 6 Issue 10, October 2017 | Popularity: 6.8 / 10


     

Preserve the Confidentiality of Information in E-government Through Steganography Based on AES technique and Unicode Standard

Abdulrahman Ahmed Alzand, Omar Hisham Rished


Abstract: Government basically alludes to give proficient, advantageous and transparent services to residents and business through data and communication technology. Governance is an option structure to the conventional perspective of government. One of the fundamental tasks of e-government is the transmission of private data from conventional to computerize on the PC systems. Albeit every e-government has its own systems and government can't deny utilizing Internet. In any case, to ensure data is prime worry for e-government and secure them with the web assaults since Internet is making a borderless world. Data security implies ensuring data and data frameworks from unapproved get to, utilize, revelation, interruption, alteration, scrutiny, investigation, recording or demolition. Data security is a set joining authoritative security and IT security. This paper concentrates on the most proficient method to secure data utilizing steganography. As steganography is solid information concealing strategy, by utilizing it is extremely helpful to shroud information as well as accommodating in character get to administration. The strategy is created to conceal the secret information with the specific picture. It is useful in security of data, exactness and straightforwardness among subjects. The paper additionally concentrates on the provisos of other information concealing method called cryptography. As data security is a prime worry in online world, it pulls in light of a legitimate concern for scientists to grow new systems and consistent assessment of it.


Keywords: Cryptography, Advance encryption standard AES, Steganography, Unicode Standard


Edition: Volume 6 Issue 10, October 2017


Pages: 797 - 802



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Abdulrahman Ahmed Alzand, Omar Hisham Rished, "Preserve the Confidentiality of Information in E-government Through Steganography Based on AES technique and Unicode Standard", International Journal of Science and Research (IJSR), Volume 6 Issue 10, October 2017, pp. 797-802, https://www.ijsr.net/getabstract.php?paperid=ART20177264, DOI: https://www.doi.org/10.21275/ART20177264



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 1362 - 1373

Design and Implementation of a Novel Hybrid Quantum-Classical Processor for Enhanced Computation Speed

Mohammed Saleem Sultan, Mohammed Shahid Sultan

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1349 - 1363

IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing

Ponnarasan Krishnan

Share this Article
Top