Future of Information and Communication Conference (FICC) 2024
4-5 April 2024
Publication Links
IJACSA
Special Issues
Future of Information and Communication Conference (FICC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 11 Issue 10, 2020.
Abstract: Sharing the information has become a facile task nowadays just like one-tap which can take the information to any component of the world. This whole thing transpired over the evolution of the cyber world, which avails to stay connected with the entire world. Due to the wide-spread utilization of the cyber world, it leads a peril of data breaching by some incognito or unauthorized people while it is being sent from one utilizer to another. Unauthorized people can get access to the data and extract utilizable information from it. The confidential data being sent through the web which may get tampered while reaching the other end-utilizer. So, to dispense this data breaching, we can encrypt the data being sent and the receiver can only decrypt the message so that we can conceal the data. It routes a tremendous way to do this, the most popular one is cryptography, and another is steganography. Anteriorly there subsist many ways in these techniques like Image Steganography, Secret key Cryptography, LSB method, and so on which are being used to encrypt data and secure communication. One of the algorithms of cryptography is utilized along with Image Steganography to encrypt the data to ascertain more security which resembles the two-step verification process. In proposed paper we utilized new Huffman coding algorithm in step of the Image Steganography to ascertain that even an astronomically immense data can fit into a minute image. The ciphertext is compressed utilizing Huffman Coding and then it gets embedded into an image utilizing LSB method of Image Steganography in which the least paramount bits of the image are superseded with the data from the antecedent step. We implemented the analytical using python and it shows better compression results with large volumes of data to transfer easily through network.
P Rajesh, Mansoor Alam, Mansour Tahernezhadi, T Ravi Kumar and Vikram Phaneendra Rajesh, “Secure Communication across the Internet by Encrypting the Data using Cryptography and Image Steganography” International Journal of Advanced Computer Science and Applications(IJACSA), 11(10), 2020. http://dx.doi.org/10.14569/IJACSA.2020.0111057
@article{Rajesh2020,
title = {Secure Communication across the Internet by Encrypting the Data using Cryptography and Image Steganography},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2020.0111057},
url = {http://dx.doi.org/10.14569/IJACSA.2020.0111057},
year = {2020},
publisher = {The Science and Information Organization},
volume = {11},
number = {10},
author = {P Rajesh and Mansoor Alam and Mansour Tahernezhadi and T Ravi Kumar and Vikram Phaneendra Rajesh}
}
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.