Steganography plays a major role in secret data communication. It is nothing but to communicate in such a way that not only the contents are hidden but also the existence of message is kept secret which makes it different from cryptography which concerns only with keeping the contents secret. Steganography and cryptography they both have the same purpose that is, to provide security to our data. But, they have a different approach. Steganography deals with making the data unseen and cryptography deals with making the data unreadable.
DATABASE SECURITY: USING ENCRYPTION TECHNIQUE AND DESIGN IN DATABASE Mareena Sahoo Janvi Tanwani Prachi Soni mareena.sahoo2013@vit.ac.in janvi.tanwani2013@vit.ac.in prachi.soni2013@vit.ac.in ABSTRACT: Database security is one of the most essential challenges in today’s world that the people are going through. In the research of traditional database, security is supposed to be authentic. The aim is to achieve security from the outside intruders and probably also against the user trying to access the personal information apart from their authorization. In this paper we discuss the problem of attaining security in an ambience where the database is not fully dependable,
The advantage of steganography over cryptography alone is that messages do not attract attention to themselves. Plainly visible encrypted messages — no matter how unbreakable — will arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal. Therefore, whereas cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties. But, the growing possibilities of modern communications need the special means of security especially on computer network. Consequently, the security of information has become a fundamental issue.
Data hiding is the art of hiding data for various purposes such as; to maintain private data, secure confidential data and so on. There are lots of techniques used for data hiding; Steganography and Watermarking; Steganography is an ancient well-known technology which has many applications even in today’s modern society. It is the art and science of hiding a secret message within a cover media in such way that only intended recipient have knowledge about secret message and the extraction of it at its destination. Cover media can be image, audio, video, text and network. It is concerned with sending a secret message while hiding its existence.
If users want to securely communicate with each other, they must share a key, which is beneficial to both encrypt and decrypt messages [1]. The security of a symmetric-key scheme should rely on the secrecy of the key, as well as in the infeasibility of decryption
Constantly updating technological solutions is simply not feasible for in-house teams. Fully understanding digital risk requires analyzing data in the right context while continuously gathering information across disparate digital assets. To do this, you need to invest in a wide variety of technologies. That is expensive and labor
Abstract : Steganography is the methodology in science that involves communicating secret data in an appropriate multimedia carrier for e.g. video, audio and image files. Audio steganography hides data in a audio signal which is a cover signal without any modification in that cover signal. Generally, Steganography concept is confused with other technique such as cryptography and watermarking, but objectives such as imperceptibility, capacity of hidden data and robustness draws thin line between them. The prime goal of steganography is to reliably send hidden information secretly, and not to reveal its presence.
Even when the text file and key both get hacked or interpreted by third party user it will open up text file which does not contain actual secret message until he knows what actually an Algorithm used he can’t retrieve the original secret message. This protects the data from being invisible and hence be secure during transmission. The user at receiving end uses an Algorithm of code to retrieve the actual secret message from the cover text using Matrix file as key. Key words: Steganography, cryptography, cover text 1. INTRODUCTION Steganography is the art or practice of concealing a message, image, or file within another message, image, or file.
Question 2: Needham and Schroeder protocol 1. The objective of the Needham and Schroeder protocol was to develop and create a better security system for the local networks, to protect the network by providing it with a secret key protocol and public key protocol. A secret key protocol was used to issue the session keys in a form of challenges to the network that integrates management purposes. Needham-Schroeder Protocol also uses a public key for authentication, and key distribution that does not depend on the secure key server, which makes it more suitable to use in networks that have many different independent domains. The solution provided by the Needham-Schroeder Protocol was to authenticate a key distributed Authentication Server that
The Fourth and Fifth Amendments protect an individual’s right to privacy and self-incrimination. For example, when a search warrant is issued to seize computer and digital evidence, data that is discovered that is unrelated to the investigation, that could encroach on that individual’s privacy will be excluded from the investigation. The chain of custody is to protect the investigators or law enforcement. The purpose is to document everything, including the data, time, what was seized, how was it seized, and who seized it, who accessed the digital or computer data, etc. This will help prevent any accusations of planted evidence or intentional tampering by the prosecution, or having the evidence thrown out for poor chain of custody (or chain of evidence).