UCSY's Research Repository

Data Security System based on Cryptography and Steganography

Show simple item record

dc.contributor.author Nwe, Aye Aye
dc.contributor.author Win, Myat Su
dc.date.accessioned 2019-07-22T07:19:12Z
dc.date.available 2019-07-22T07:19:12Z
dc.date.issued 2010-12-16
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/1148
dc.description.abstract Data security system is implemented by using two methods: cryptography and steganography. The effect of these two methods enhances the security of the data and intended to hide and cover the messages within one of the standard media, images. Encryption the data with a cryptography algorithm called Sosemanuk stream cipher. This encryption process is done with help of crypto-key, and the detection or reading of encrypted information is possible only having the key. After encryption, a part of the encrypted message (cipher) is hidden in Least Significant Bit of an image file using steganography algorithm. The technique used in this field replaces the LSB of image pixels with intended secret bits. The system can be used as a part to protect e-mail messages, credit card information, corporate data, etc. en_US
dc.language.iso en en_US
dc.publisher Fifth Local Conference on Parallel and Soft Computing en_US
dc.subject Cryptography en_US
dc.subject Steganography en_US
dc.subject Data Security en_US
dc.subject Sosemanuk Stream Cipher en_US
dc.subject LSB en_US
dc.title Data Security System based on Cryptography and Steganography en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics