International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 242

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.4 / 10


     

Implementation of Steganography with ETC System for Different Data Transmission

Gauri Chavan, S. S. Vairagar


Abstract: Data transmission in a secure manner over the internet has gained higher interest since last decade as the use of encryption for transmitting embedded files before compression is very essential. The major challenge is designing the architecture so as to perform the file encryption at sender side and the file compression at the NSP side in order to achieve the distinguished works assigned to senders and NSP. The proposed architecture comprises a novel architecture where resources required for file compression are utilised from NSP quota while resources only for encryption are used from Sender quota. The proposed system makes use of pre-defined AES encryption algorithm for encrypting the files and LSB Steganography for hiding the sensitive data in the images. With the AES, mathematical technique is more productive for efficient compression of files that are been already encrypted. While as far as compression is concerned, Huffman algorithm is not feasible, as it gives less compression proportion, compared to the other lossless coders as inputs.


Keywords: Steganography, Encryption, Compression, LSB Stegnography


Edition: Volume 5 Issue 6, June 2016


Pages: 2101 - 2105



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Gauri Chavan, S. S. Vairagar, "Implementation of Steganography with ETC System for Different Data Transmission", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 2101-2105, https://www.ijsr.net/getabstract.php?paperid=NOV164770

Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 5, May 2022

Pages: 885 - 888

Image Based Steganography

Bheeshma Rao J, Ujwal Sai Satya Jorige, Sai Praneetha Katragadda, Pradeep Kumar .V

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article
Top