Views: 114 , Downloads: 105 | CTR: 92 %
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 8, August 2015
Improving Security for Digital Signature by Using Steganography
G. Pranitha, Ch. Suman Chakravarthy
In this paper, we enhance the security for the data by hiding the message using steganographic technique. Initially the given message is taken as input and we generate digital signature using MD5 algorithm. After generating the signature we conceal the given message using steganography.Now, the message which is hidden along with the digital signature is sent to the receiver.The receiver applies the steganographic technique to retrieve the message and then verifies the digital signature.
Keywords: Encryption, MD5, image steganography, digital signature
Edition: Volume 4 Issue 8, August 2015
Pages: 1324 - 1327
How to Cite this Article?
G. Pranitha, Ch. Suman Chakravarthy, "Improving Security for Digital Signature by Using Steganography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB157581, Volume 4 Issue 8, August 2015, 1324 - 1327
114 PDF Views | 105 PDF Downloads
Similar Articles with Keyword 'Encryption'
Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari, Ayush Pandey
Views: 165 , Downloads: 91 | CTR: 55 %
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙6
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1732 - 1734A Secure Video Encryption Technique Using Rijndael Algorithm
N. Geetha, K. Mahesh
Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1833 - 1836A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing
Roshan M. Kawale, Bharti L. Dhote
Similar Articles with Keyword 'MD5'
Views: 139 , Downloads: 98 | CTR: 71 % | Weekly Popularity: ⮙3
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Views: 137 , Downloads: 105 | CTR: 77 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2302 - 2305Detection and Prevention of Cooperative Wormhole Attack in a MANET
Anuradha T, Padmashree S. Shedbalkar
Views: 114 , Downloads: 105 | CTR: 92 %
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1324 - 1327Improving Security for Digital Signature by Using Steganography
G. Pranitha, Ch. Suman Chakravarthy
Views: 129 , Downloads: 107 | CTR: 83 % | Weekly Popularity: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1821 - 1823A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance
Sneha Singha, S. D. Satav
Views: 133 , Downloads: 111 | CTR: 83 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 572 - 575Prevention of Mobile Botnet in VPN
Sukhwinder Singh, Navdeep Kaur
Similar Articles with Keyword 'image steganography'
Views: 126 , Downloads: 105 | CTR: 83 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015
Pages: 1367 - 1372Comparative Study for Steganography Techniques
Zainalabideen Abdual Samad Rasheed
Views: 114 , Downloads: 105 | CTR: 92 %
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1324 - 1327Improving Security for Digital Signature by Using Steganography
G. Pranitha, Ch. Suman Chakravarthy
Views: 131 , Downloads: 107 | CTR: 82 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1367 - 1370A Review on Various Approaches of Video Steganography
Sapanpreet Kaur, Mandeep Kaur
Views: 137 , Downloads: 111 | CTR: 81 %
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3198 - 3203A Study and Review of Techniques of Spatial Steganography
Ravneet Kaur, Bhavneet Kaur
Views: 132 , Downloads: 111 | CTR: 84 % | Weekly Popularity: ⮙2
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 2024 - 2028A Review on Various Approaches for Image Steganography
Urvashi, Amninder Kaur
Similar Articles with Keyword 'digital signature'
Views: 156 , Downloads: 87 | CTR: 56 % | Weekly Popularity: ⮙5
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Views: 165 , Downloads: 91 | CTR: 55 %
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Views: 124 , Downloads: 99 | CTR: 80 % | Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1936 - 1939Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way
D. Hemalatha, R. Arunudaya
Views: 155 , Downloads: 103 | CTR: 66 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1140 - 1143Intrusion-Detection System for MANETs
S. Srihari Reddy, S. Z. Parveen
Views: 148 , Downloads: 104 | CTR: 70 % | Weekly Popularity: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1220 - 1223EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature
Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar