International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 104

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014


Advanced Technique for Comprehensive Data Security

Pramendra Kumar | Vijay Kumar Sharma [2]


Abstract: In any communication, security is the most important task. With the advancement of technology and the wide use of World Wide Web for communication increase the challenges of security. Most of the classical security method are based on cryptography and stegnography techniques, but every time these technologies may not be reliable for communication of secrete information over a long distance. Where cipher text may easily arouse attackers suspicion, the biggest concern in the field of steganography is the rapid advancement of research in steganalysis, the counter-technology of steganography. This merely means that steganography needs to add security services to its current repertoire, while not increasing the number of problems. However, in recent years, a lot of research has taken place in direction to trim down the security issues by contributing various approaches but different terrains pose separate challenges. These inadequacies of modern as well as traditional security methods, motivates to design a novel security system that improve the level of security. In this context, this paper has proposed a novel two layer security mechanism by combining the concepts of both, cryptography and stegnography techniques.


Keywords: Cryptography, Stegnography, Security, Data hiding, Encryption


Edition: Volume 3 Issue 10, October 2014,


Pages: 1319 - 1323


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Pramendra Kumar, Vijay Kumar Sharma, "Advanced Technique for Comprehensive Data Security", International Journal of Science and Research (IJSR), Volume 3 Issue 10, October 2014, pp. 1319-1323, https://www.ijsr.net/get_abstract.php?paper_id=OCT14465

Similar Articles with Keyword 'Cryptography'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya [10] | R. Sathya [8]

Share this Article
Top