Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/1723
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Patel, Kuntal P. | - |
dc.contributor.author | Lalwani, Mahesh | - |
dc.contributor.author | Jadav, Hardik | - |
dc.date.accessioned | 2010-11-10T05:47:59Z | - |
dc.date.available | 2010-11-10T05:47:59Z | - |
dc.date.issued | 2010-03-05 | - |
dc.identifier.citation | National Conference on Information and Communication Technology (NCICT) – 2010, Udaipur, Rajasthan, March 5-6, 2010 | en |
dc.identifier.uri | http://hdl.handle.net/123456789/1723 | - |
dc.description.abstract | Today’s networked based information systems are transferring secret data electronically. Numbers of Cryptographic techniques are available to protect such data. One lesser known but rapidly growing method is Steganography; it is an art and science of hiding information such that it does not even appear to exist. Steganography can be used to hide messages, secret keys, private data or information into a text file, image, audio or a video file. There are certain disadvantages when we use only cryptographic techniques. Attacker can easily understand that something important is stored in the encrypted message. Combination of Cryptography and Steganography allows us to send the sensitive data through the use of multimedia file with the great security. In this paper we had proposed new algorithm for implementing greater security on the information being transferred over the network by combining Cryptographic techniques and Steganography using an audio file. The paper also describes the advantages and disadvantages of proposed algorithm, as well as, strengths and weaknesses of the Steganography. | en |
dc.relation.ispartofseries | ITFCA006-5 | en |
dc.subject | Steganography | en |
dc.subject | Cryptography | en |
dc.subject | Stegno-text | en |
dc.subject | Cover text | en |
dc.subject | Computer Faculty Paper | en |
dc.subject | Faculty Paper | en |
dc.subject | ITFCA006 | en |
dc.subject | 08MCA18 | en |
dc.subject | 08MCA15 | en |
dc.title | Steganography – Hiding Critical Information through Multimedia-Audio File | en |
dc.type | Faculty Papers | en |
Appears in Collections: | Faculty Papers, CE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ITFCA006-5.pdf | ITFCA006-5 | 82.86 kB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.