Advanced Technique for Comprehensive Data Security
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

In any communication, security is the most important task. With the advancement of technology and the wide use of World Wide Web for communication increase the challenges of security. Most of the classical security method are based on cryptography and stegnography techniques, but every time these technologies may not be reliable for communication of secrete information over a long distance. Where cipher text may easily arouse attackers suspicion, the biggest concern in the field of steganography is the rapid advancement of research in steganalysis, the counter-technology of steganography. This merely means that steganography needs to add security services to its current repertoire, while not increasing the number of problems.However, in recent years, a lot of research has taken place in direction to trim down the security issues by contributing various approaches but different terrains pose separate challenges. These inadequacies of modern as well as traditional security methods, motivates to design a novel security system that improve the level of security. In this context, this paper has proposed a novel two layer security mechanism by combining the concepts of both, cryptography and stegnography techniques.

Keywords: Cryptography, Stegnography, Security, Data hiding, Encryption

Edition: Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Share this Article

How to Cite this Article?

Pramendra Kumar, Vijay Kumar Sharma, "Advanced Technique for Comprehensive Data Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT14465, Volume 3 Issue 10, October 2014, 1319 - 1323

109 PDF Views | 83 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Similar Articles with Keyword 'Stegnography'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2101 - 2105

Implementation of Steganography with ETC System for Different Data Transmission

Gauri Chavan, S. S. Vairagar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 12, December 2013

Pages: 423 - 426

An Efficient Higher LSB Method for Hiding Encrypted Data into Guard Pixels Region of a Multicarrier Image Objects

Komal B.Bijwe, G. R. Bamnote

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 602 - 605

A Review on Various Approaches for Data Hiding

Sukhjinder Pal Kaur, Sonika Jindal

Share this Article

Similar Articles with Keyword 'Security'

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 700 - 705

Virtual Augmented Reality Application and Research in Police Station Management System with Security Aspects

Kale Jyoti S

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 890 - 894

A Survey on Types of Crawlers and Web Searching Algorithms

T. Yogameera, Dr. D. Shanthi

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Data hiding'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 907 - 910

A Steganography Approach to Protect Secret Information in Computer Network

Prajakta B. Diwan, V. B. Bhagat

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1976 - 1979

Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method

Ekata S. Bele, Chetan Bawankar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Share this Article

Similar Articles with Keyword 'Encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1812 - 1814

A Survey on Deduplication Scheme in Cloud Storage

Deepa.D, Revathi.M

Share this Article
Top