Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016
Implementation of Steganography with ETC System for Different Data Transmission
Gauri Chavan, S. S. Vairagar
Data transmission in a secure manner over the internet has gained higher interest since last decade as the use of encryption for transmitting embedded files before compression is very essential. The major challenge is designing the architecture so as to perform the file encryption at sender side and the file compression at the NSP side in order to achieve the distinguished works assigned to senders and NSP. The proposed architecture comprises a novel architecture where resources required for file compression are utilised from NSP quota while resources only for encryption are used from Sender quota. The proposed system makes use of pre-defined AES encryption algorithm for encrypting the files and LSB Steganography for hiding the sensitive data in the images. With the AES, mathematical technique is more productive for efficient compression of files that are been already encrypted. While as far as compression is concerned, Huffman algorithm is not feasible, as it gives less compression proportion, compared to the other lossless coders as inputs.
Keywords: Steganography, Encryption, Compression, LSB Stegnography
Edition: Volume 5 Issue 6, June 2016
Pages: 2101 - 2105
How to Cite this Article?
Gauri Chavan, S. S. Vairagar, "Implementation of Steganography with ETC System for Different Data Transmission", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV164770, Volume 5 Issue 6, June 2016, 2101 - 2105
107 PDF Views | 94 PDF Downloads
Similar Articles with Keyword 'Steganography'
A Survey on Steganography Techniques
Amruta B. Bhojane, Priti A. Kodake
A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
A Review of Privacy Protection of Cloud Storage and Steganography Techniques
Alok Ranjan, Mansi Bhonsle
Comparative Study for Steganography Techniques
Zainalabideen Abdual Samad Rasheed
Reversible Data Embedding using F5 Algorithm
Sanjivani Koli, N. B. Pokale
Similar Articles with Keyword 'Encryption'
Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Similar Articles with Keyword 'Compression'
Survey Paper on Users Location Hiding In Geosocial Recommendation Applications
Mayura Phadnis, Kanchan Varpe
An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud
Nagaraj S Kolhar, Dr. Suvarna Nandyal
Improving Target Coverage and Network Connectivity of Mobile Sensor Networks
Sonali Karegaonkar, Archana Raut
Medical Image Compression Using ISPIHT & JPEG2000 Hybrid
Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition
Devashri Anil Vyawahare, Prof. Anil Gujar