Hybrid Secure Data Transfer Scheme Using Cryptography and Steganography

Author(s):  
Rashmi Shree ◽  
Dinesh Swami
Author(s):  
Mukesh Soni ◽  
Gaurav Dhiman ◽  
Brajendra Singh Rajput ◽  
Rajan Patel ◽  
Nitesh Kumar Tejra

2015 ◽  
Vol 8 (1) ◽  
pp. 17 ◽  
Author(s):  
R. Valarmathi ◽  
G. M. Kadhar Nawaz

Author(s):  
Prasanna Mala Chelamkuri ◽  
E. G. Bhavya Reddy ◽  
Annapurnaeswari Jonna
Keyword(s):  

Author(s):  
Nisha Manral

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.


2017 ◽  
Vol 13 (02) ◽  
pp. 34 ◽  
Author(s):  
Varun Tiwari ◽  
Avinash Keskar ◽  
NC Shivaprakash

Designing an Internet of Things (IoT) enabled environment requires integration of various things/devices. Integrating these devices require a generalized approach as these devices can have different communication protocols. In this paper, we have proposed generalized nodes for connecting various devices. These nodes are capable of creating a scalable local wireless network that connects to the cloud through a network gateway. The nodes also support over the air programming to re-configure the network from the cloud. As number of devices connected to the cloud increases, the network traffic also increases. In order to reduce the network traffic we have used different data transfer schemes for the network. We have also proposed an event-based data transfer scheme for situations where there is low probability of change in sensor value. The experimental results shows that the event-based scheme reduces the data traffic by up to 48% under practical conditions without any loss of information compared to priority based data transfer. We have also shown that the proposed scheme is more reliable for data transfer in a large network with a success rate of 99.5% measured over 200 minutes for 1201 data packets.


Sign in / Sign up

Export Citation Format

Share Document