International Journal For Multidisciplinary Research

E-ISSN: 2582-2160     Impact Factor: 9.24

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 6 Issue 4 July-August 2024 Submit your research before last 3 days of August to publish your research paper in the issue of July-August.

A Comparative Study Of Cryptography And Image Steganography Technique

Author(s) Shikha Choudhary, Shamshad Husain
Country India
Abstract Data security involves protecting digital information to prevent unauthorized access to computers, databases, and websites. Cryptography, encryption, and compression are key strategies for data protection. AES is a powerful cryptographic method. Confidentiality, authenticity, integrity, and non-repudiation are crucial for online communication. Steganography enhances message security across networks, using a photo as a cover material. The smart grid offers flexibility, reliability, and efficiency in power production and distribution. To protect privacy and confidentiality, greyscale cover images undergo discrete wavelet transformation (DWT) and a chaotic map is applied to the secret image
Keywords Cryptography Concept, Security, Integrity DWT, Security, Information Hiding, Steganography
Field Computer > Network / Security
Published In Volume 5, Issue 5, September-October 2023
Published On 2023-10-31
Cite This A Comparative Study Of Cryptography And Image Steganography Technique - Shikha Choudhary, Shamshad Husain - IJFMR Volume 5, Issue 5, September-October 2023. DOI 10.36948/ijfmr.2023.v05i05.8217
DOI https://doi.org/10.36948/ijfmr.2023.v05i05.8217
Short DOI https://doi.org/gs38pt

Share this