Triple layer data security
暂无分享,去创建一个
The growth of high speed computer networks and that of Internet, in particular, has hiked the ease of Data Communication. But in the other hand this growth is also responsible for the snooping of Data at the same time. The ease, by which digital information can be duplicated and distributed, has led to the need for effective protection tools. Various encryption techniques like cryptography, digital watermarking, steganography etc have already been introduced in attempt to address these growing concerns. In this paper, an algorithmic approach is proposed in which along with the combination of cryptography and steganography (taken as security layers), an extra layer of security has been imposed in between them to obtain a completely secured data transmission scheme.
[1] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[2] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[3] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .