Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/15827
Full metadata record
DC FieldValueLanguage
dc.contributor.authorALAM, FIROZ-
dc.date.accessioned2017-07-25T16:28:09Z-
dc.date.available2017-07-25T16:28:09Z-
dc.date.issued2017-07-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/repository/15827-
dc.description.abstractCorporations in both the private and public domains have become more and more reliant on automated data processing. Massive amounts of digital data is being collected and stored in huge computer data bases and transmission of data taking place between terminal devices and computers that are connected together in complex communications networks. Without appropriate security measures, the data is susceptible to interception when in transmission, or data may be physically removed or copied while in storage. This would result in undesirable exposures of data and potential invasions of privacy. Data are also vulnerable to unauthorized deletion, alteration or addition during transmission or storage. This can result in illegal access to computing resources and services, distortion of personal data or business records, or the conduct of fraudulent transactions, which may also lead to increase in credit authorizations, funds transfers’ modification, and the issuance of unauthorized payments [16]. Security authorities after recognizing that the secrecy and integrity of certain data must be secured, have passed regulations to help prevent these problems. But regulations alone cannot attacks or eradicate threats to data processing systems. Additional steps are required to preserve the secrecy and integrity of digital data. Among the security measures that have come up as a solution are cryptography and steganography, which uses methods for rendering data unintelligible to unauthorized parties. Cryptography and steganography are the techniques that are used for safeguarding information transferred via communication-networks that uses communications satellites, land lines, and microwave technology. Steganographic procedures hide the existence of secret data thereby adding a new facet to digital security. Cryptographic procedures beside secrecy also provide extra security to data using digital signatures, message authentication, and personal identification for authorizing electronic funds transfer and credit card transactions.en_US
dc.language.isoenen_US
dc.relation.ispartofseriesTD-2800;-
dc.subjectAES CRYPTOGRAPHYen_US
dc.subjectCOLOR IMAGE STEGANOGRAPHYen_US
dc.subjectDATA TRANSMISSIONen_US
dc.titleSECURE DATA TRANSMISSION USING AES CRYPTOGRAPHY IN COLOR IMAGE STEGANOGRAPHYen_US
dc.typeThesisen_US
Appears in Collections:M.E./M.Tech. Computer Engineering

Files in This Item:
File Description SizeFormat 
Secure Data Transmission Using AES Cryptography In Color Image Steganography.pdf1.07 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.