Improving Security for Digital Signature by Using Steganography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 114 , Downloads: 105 | CTR: 92 %

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 8, August 2015

Improving Security for Digital Signature by Using Steganography

G. Pranitha, Ch. Suman Chakravarthy

In this paper, we enhance the security for the data by hiding the message using steganographic technique. Initially the given message is taken as input and we generate digital signature using MD5 algorithm. After generating the signature we conceal the given message using steganography.Now, the message which is hidden along with the digital signature is sent to the receiver.The receiver applies the steganographic technique to retrieve the message and then verifies the digital signature.

Keywords: Encryption, MD5, image steganography, digital signature

Edition: Volume 4 Issue 8, August 2015

Pages: 1324 - 1327

Share this Article

How to Cite this Article?

G. Pranitha, Ch. Suman Chakravarthy, "Improving Security for Digital Signature by Using Steganography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB157581, Volume 4 Issue 8, August 2015, 1324 - 1327

114 PDF Views | 105 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Encryption'

Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Views: 165 , Downloads: 91 | CTR: 55 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1732 - 1734

A Secure Video Encryption Technique Using Rijndael Algorithm

N. Geetha, K. Mahesh

Share this Article

Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Similar Articles with Keyword 'MD5'

Views: 139 , Downloads: 98 | CTR: 71 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Views: 137 , Downloads: 105 | CTR: 77 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2302 - 2305

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T, Padmashree S. Shedbalkar

Share this Article

Views: 114 , Downloads: 105 | CTR: 92 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1324 - 1327

Improving Security for Digital Signature by Using Steganography

G. Pranitha, Ch. Suman Chakravarthy

Share this Article

Views: 129 , Downloads: 107 | CTR: 83 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1821 - 1823

A Survey Paper on Cloud Storage Auditing with Key Exposure Resistance

Sneha Singha, S. D. Satav

Share this Article

Views: 133 , Downloads: 111 | CTR: 83 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 572 - 575

Prevention of Mobile Botnet in VPN

Sukhwinder Singh, Navdeep Kaur

Share this Article

Similar Articles with Keyword 'image steganography'

Views: 126 , Downloads: 105 | CTR: 83 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, Iraq, Volume 4 Issue 1, January 2015

Pages: 1367 - 1372

Comparative Study for Steganography Techniques

Zainalabideen Abdual Samad Rasheed

Share this Article

Views: 114 , Downloads: 105 | CTR: 92 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1324 - 1327

Improving Security for Digital Signature by Using Steganography

G. Pranitha, Ch. Suman Chakravarthy

Share this Article

Views: 131 , Downloads: 107 | CTR: 82 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1367 - 1370

A Review on Various Approaches of Video Steganography

Sapanpreet Kaur, Mandeep Kaur

Share this Article

Views: 137 , Downloads: 111 | CTR: 81 %

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3198 - 3203

A Study and Review of Techniques of Spatial Steganography

Ravneet Kaur, Bhavneet Kaur

Share this Article

Views: 132 , Downloads: 111 | CTR: 84 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2024 - 2028

A Review on Various Approaches for Image Steganography

Urvashi, Amninder Kaur

Share this Article

Similar Articles with Keyword 'digital signature'

Views: 156 , Downloads: 87 | CTR: 56 % | Weekly Popularity: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Views: 165 , Downloads: 91 | CTR: 55 %

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 124 , Downloads: 99 | CTR: 80 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1936 - 1939

Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way

D. Hemalatha, R. Arunudaya

Share this Article

Views: 155 , Downloads: 103 | CTR: 66 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1140 - 1143

Intrusion-Detection System for MANETs

S. Srihari Reddy, S. Z. Parveen

Share this Article

Views: 148 , Downloads: 104 | CTR: 70 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article
Top