Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/20614
Title: | A hybrid multilevel approach to enhance data security through crypto and stegano systems |
Researcher: | Umarani, R |
Guide(s): | Duraiswamy, K |
Keywords: | HYBRID MULTILEVEL STEGANO SYSTEMS |
Upload Date: | 8-Jul-2014 |
University: | Periyar University |
Completed Date: | 01/06/2005 |
Abstract: | Nowadays computers form a part of everyones life Internet becomes a newlinevast resource of information Most of the public academicians industrialists newlinecommon businessmen and enterprises all use internet for some purpose or the newlineother They use internet mainly for transferring information Internet plays a vital newlinerole in all the business transactions today newlineIn conventional days data are stored physically Any confidential newlineinformation is written typed in a paper and that is kept in a locker Only the newlineperson who has the key to the locker can access the data Hence security of the newlinedata is guaranteed newlineWhen data transfer takes place through internet it is done electronically newlineData is stored as bits and bytes When it is available in the internet it is available newlineto the whole universe Anyone at any time anywhere can access the data and newlinetamper it Electronic data transfer through internet does not guarantee any newlinesecurity of the data Hence electronic data storage does not enforce any security newlineunless some strong measures have been taken newlineWhen transferring data over the internet its security is to be given utmost newlineimportance Hence means must be provided to keep the data secured There are newlinelots of techniques available to store the data in a secured way But none of them newlinehas proved to be an efficient one Most of the methods are vulnerable to attacks in newlineoneway or the other newlineNetwork security is indeed the hot topic of discussion amongst all newlinecomputer enthusiasts and it has also become a major concern in boardrooms newlineacross the globe Companies have started taking computer security very seriously newlineand now have dedicated technical teams who maintain and secure the companys newlinesensitive information round the clock Even individuals who use the ultimate newlineknowledge tool known to mankind namely the internet for recreational purposes newlineonly have started to show an increased demand for tools or ways to protect their newlinesystem against computer criminals However the bottom line is that computer newlinecriminals have always been two steps ahead of crime fighting agencies and the newlinetarget |
Pagination: | xii,160p |
URI: | http://hdl.handle.net/10603/20614 |
Appears in Departments: | Department of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 61.63 kB | Adobe PDF | View/Open |
02_declaration.pdf | 8.43 kB | Adobe PDF | View/Open | |
03_certificate.pdf | 9.02 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 11.78 kB | Adobe PDF | View/Open | |
05_contents.pdf | 43.66 kB | Adobe PDF | View/Open | |
06_list of tables,symbols,figures.pdf | 39.34 kB | Adobe PDF | View/Open | |
07_abstract.pdf | 76.04 kB | Adobe PDF | View/Open | |
08_chapter 1.pdf | 758.37 kB | Adobe PDF | View/Open | |
09_chapter 2.pdf | 384.94 kB | Adobe PDF | View/Open | |
10_chapter 3.pdf | 174.63 kB | Adobe PDF | View/Open | |
11_chapter 4.pdf | 212.23 kB | Adobe PDF | View/Open | |
12_chapter 5.pdf | 154.39 kB | Adobe PDF | View/Open | |
13_chapter 6.pdf | 174.29 kB | Adobe PDF | View/Open | |
14_chapter 7.pdf | 43.48 kB | Adobe PDF | View/Open | |
15_references.pdf | 143.49 kB | Adobe PDF | View/Open | |
16_publications.pdf | 20.12 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: