Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/365119
Title: | Advanced hiding techniques for data security |
Researcher: | Manjula Yerva |
Guide(s): | K B Shivakumar |
Keywords: | Engineering Engineering and Technology Engineering Electrical and Electronic |
University: | Sri Siddhartha Academy of Higher Education |
Completed Date: | 2021 |
Abstract: | Evolution in digital communication and networking gives rise to serious threats for secured data transfer. It is the confidentially secured information that flows via network powers the global system economy. In this context, to ensure the data security in communication channel, highly sensitive confidential information should not reach unaccredited destination. Algorithms related to data security has attracted many researchers to introduce creative and innovative algorithms such that they resist the intruders to monitor and access the secured confidential data. newlineDue to advances in Information technology, most of the data is digital in nature. It means data is created, manipulated, stored and communicated in digital form using computers and networks. High priority, has to be given to secure this digital data which is more prone to numerous number of attacks. Cryptography and Steganography techniques are established and habitual data security techniques that holds the data in order to encrypt or hide their existence respectively. Constantly new models are designed, developed and implemented to secure data. Multiple layers of security always ensures collective security to data. Web pages are more prone to blended attacks which is big challenge for computer users. To solve these problems, a comprehensive approach is made by combining the features of cryptographic and Steganographic techniques which analyze and correlate the problems raised by the intruders. newline In this thesis prominence is given for multiple layered crypto stego algorithms to enhance the data security as well as end to end user security by providing a backup security defence mechanism if any one security layer is at compromise. newline |
Pagination: | 15016kb |
URI: | http://hdl.handle.net/10603/365119 |
Appears in Departments: | Electronics & Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 274 kB | Adobe PDF | View/Open |
02_certificate.pdf | 243.07 kB | Adobe PDF | View/Open | |
03_preliminary pages.pdf | 1.01 MB | Adobe PDF | View/Open | |
04_chapter 1.pdf | 6.01 MB | Adobe PDF | View/Open | |
05_chapter 2.pdf | 4.48 MB | Adobe PDF | View/Open | |
06_chapter 3.pdf | 1.76 MB | Adobe PDF | View/Open | |
07_chapter 4.pdf | 3.83 MB | Adobe PDF | View/Open | |
08_chapter 5.pdf | 2.69 MB | Adobe PDF | View/Open | |
09_chapter 6.pdf | 3.2 MB | Adobe PDF | View/Open | |
10_chapter 7.pdf | 3.8 MB | Adobe PDF | View/Open | |
11_bibilography.pdf | 733.12 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 610.8 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: