Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/365119
Title: Advanced hiding techniques for data security
Researcher: Manjula Yerva
Guide(s): K B Shivakumar
Keywords: Engineering
Engineering and Technology
Engineering Electrical and Electronic
University: Sri Siddhartha Academy of Higher Education
Completed Date: 2021
Abstract: Evolution in digital communication and networking gives rise to serious threats for secured data transfer. It is the confidentially secured information that flows via network powers the global system economy. In this context, to ensure the data security in communication channel, highly sensitive confidential information should not reach unaccredited destination. Algorithms related to data security has attracted many researchers to introduce creative and innovative algorithms such that they resist the intruders to monitor and access the secured confidential data. newlineDue to advances in Information technology, most of the data is digital in nature. It means data is created, manipulated, stored and communicated in digital form using computers and networks. High priority, has to be given to secure this digital data which is more prone to numerous number of attacks. Cryptography and Steganography techniques are established and habitual data security techniques that holds the data in order to encrypt or hide their existence respectively. Constantly new models are designed, developed and implemented to secure data. Multiple layers of security always ensures collective security to data. Web pages are more prone to blended attacks which is big challenge for computer users. To solve these problems, a comprehensive approach is made by combining the features of cryptographic and Steganographic techniques which analyze and correlate the problems raised by the intruders. newline In this thesis prominence is given for multiple layered crypto stego algorithms to enhance the data security as well as end to end user security by providing a backup security defence mechanism if any one security layer is at compromise. newline
Pagination: 15016kb
URI: http://hdl.handle.net/10603/365119
Appears in Departments:Electronics & Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File274 kBAdobe PDFView/Open
02_certificate.pdf243.07 kBAdobe PDFView/Open
03_preliminary pages.pdf1.01 MBAdobe PDFView/Open
04_chapter 1.pdf6.01 MBAdobe PDFView/Open
05_chapter 2.pdf4.48 MBAdobe PDFView/Open
06_chapter 3.pdf1.76 MBAdobe PDFView/Open
07_chapter 4.pdf3.83 MBAdobe PDFView/Open
08_chapter 5.pdf2.69 MBAdobe PDFView/Open
09_chapter 6.pdf3.2 MBAdobe PDFView/Open
10_chapter 7.pdf3.8 MBAdobe PDFView/Open
11_bibilography.pdf733.12 kBAdobe PDFView/Open
80_recommendation.pdf610.8 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: