Paper Details
Network Security using StegoCrypt
Authors
Rudra J. Vivarekar, Nikita J. Kolhe, Darshana A. Mundada, Yogita G. Motiramani
Abstract
Information security plays a vital role in communication.
The threats to information security have been incrementing
at confounding rate. The most influential approaches
used against such threats are cryptography and steganography.
Cryptography and Steganography are two most popular ways
to secure data transmission. However, combination of these two
techniques results in appearing a highly secured method for data
communication. In the proposed system for cryptography, the
algorithm of substitution is based on Play Color Cipher and
asymmetric RSA algorithm is used to make Play Color Cipher
key in encrypted form. In steganography, encrypted key is hidden
using multimedia steganography technique.
Keywords
Citation
Network Security using StegoCrypt. Rudra J. Vivarekar, Nikita J. Kolhe, Darshana A. Mundada, Yogita G. Motiramani. 2017. IJIRCT, Volume 2, Issue 5. Pages 187-189. https://www.ijirct.org/viewPaper.php?paperId=IJIRCT1601033