scholarly journals Information Security through data Encryption and Data Hiding

2010 ◽  
Vol 4 (12) ◽  
pp. 32-35
Author(s):  
Samir Kumar Bandyopadhyay ◽  
Somaditya Roy
Author(s):  
Bachujayendra Kumar ◽  
Rajya Lakshmidevi K ◽  
M Verginraja Sarobin

Wireless sensor networks (WSNs) have been used widely in so many applications. It is the most efficient way to monitor the information. There areso many ways to deploy the sensors. Many problems are not identified and solved. The main challenge of WSN is energy efficiency and information security. WSN power consumption is reduced by genetic algorithm-based clustering algorithm. Information from cluster head to base station may have a lot of chances to get hacked. The most reliable way to manage energy consumption is clustering, and encryption will suit best for information security. In this paper, we explain clustering techniques and a new algorithm to encrypt the data in the network.


Author(s):  
Nichirvan Asaad Zebari ◽  
Dilovan Asaad Zebari ◽  
Diyar Qader Zeebaree ◽  
Jwan Najeeb Saeed

<p><span>Information security and confidentiality are the prime concern of any type of communication. Rapidly evolution of technology recently, leads to increase the intruder’s ability and a main challenge to information security. Therefore, utilizing the non-traditional basics for information security is required, such as DNA which is focused as a new aspect to achieve better security. In this paper, a survey of more recent DNA based on data hiding algorithms are covered. With particular emphasis of different parameters several data hiding algorithms based on DNA has been reviewed. To present a more secure an efficient data hiding algorithms based on DNA for future works, this willbe helpful. </span></p>


Author(s):  
Ming Yang ◽  
Monica Trifas ◽  
Guillermo Francia ◽  
Lei Chen ◽  
Yongliang Hu

Information security has traditionally been ensured with data encryption techniques. Different generic data encryption standards, such as DES, RSA, AES, have been developed. These encryption standards provide high level of security to the encrypted data. However, they are not very efficient in the encryption of multimedia contents due to the large volume of digital image/video data. In order to address this issue, different image/video encryption methodologies have been developed. These methodologies encrypt only the key parameters of image/video data instead of encrypting it as a bitstream. Joint compression-encryption is a very promising direction for image/video encryption. Nowadays, researchers start to utilize information hiding techniques to enhance the security level of data encryption methodologies. Information hiding conceals not only the content of the secret message, but also its very existence. In terms of the amount of data to be embedded, information hiding methodologies can be classified into low bitrate and high bitrate algorithms. In terms of the domain for embedding, they can be classified into spatial domain and transform domain algorithms. In this chapter, the authors have reviewed various data encryption standards, image/video encryption algorithms, and joint compression-encryption methodologies. Besides, the authors have also presented different categories of information hiding methodologies as well as data embedding strategies for digital image/video contents.


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Bin Wang ◽  
Yingjie Xie ◽  
Shihua Zhou ◽  
Changjun Zhou ◽  
Xuedong Zheng

Biocomputing, especially DNA, computing has got great development. It is widely used in information security. In this paper, a novel algorithm of reversible data hiding based on DNA computing is proposed. Inspired by the algorithm of histogram modification, which is a classical algorithm for reversible data hiding, we combine it with DNA computing to realize this algorithm based on biological technology. Compared with previous results, our experimental results have significantly improved the ER (Embedding Rate). Furthermore, some PSNR (peak signal-to-noise ratios) of test images are also improved. Experimental results show that it is suitable for protecting the copyright of cover image in DNA-based information security.


2019 ◽  
Author(s):  
Abbas Khurum

This article provide analysis about information security using cryptography techniques. After the analyzing different techniques of encryption, we are proposing Advance Encryption Standard (AES). The AES has the better security compared others encryption algorithm and prevent data from Spoofing. It is very efficient in both hardware and software.


Sign in / Sign up

Export Citation Format

Share Document