A Survey on Secured Data Transmission Using RSA Algorithm and Steganography
Keywords:
Cryptography, RSA, Encryption, Unscrambling, Steganography.Abstract
Conceptual In the cutting edge world, there is a need of high security of media information. This verified framework ought to give classification, genuineness, respectability and non-disavowal in the system. The private subtleties moved through web are hacked by phishing in an electronic correspondence world. So data security plays a significant job. The Cryptographic calculations are applied over numerous applications for secure transmission of information against dangerous assaults. Steganography is utilized to conceal their reality. Rivest-Shamir-Adleman (RSA) is an awry cryptographic, profoundly verified calculation. Since it is mind boggling to process, extraordinary strategies are applied to build the speed of a RSA calculation. This paper proposed a strategy to upgrade the security of correspondence by consolidating cryptography and steganography strategies. The proposed framework is progressively productive in verifying information from unapproved clients.
References
- M.Rajkamal and B.S.E. Zoraida, "Picture and Text Concealing utilizing RSA and Blowfish Algorithms with Hash- LSB Technique", International Journal of Innovative Science, Engineering and Technology, Vol. 1 Issue 6,August 2014.
- Sarthak R Patel, Prof. Khushbu Shah, and Gaurav R Patel, "Concentrate on Improvements in RSA Algorithm", Worldwide Journal of Engineering Development and Research, 2014.
- Israt Jahan, Mohammad Asif, Liton Jude Rozario, "Improved RSA cryptosystem dependent on the investigation of number hypothesis and open key cryptosystems", American Diary of Engineering Research (AJER), Vol 4, Issue 1, 2015.
- Amare Anagaw Ayele and Dr. Vuda Sreenivasarao, "A Altered RSA Encryption Technique Based on Multiple open keys", International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 4, June 2013.
- Dr. Abdulameer K. Hussain, "A Modified RSA Calculation for Security Enhancement and Redundant Messages Elimination Using K-Nearest Neighbor Calculation", International Journal of Innovative Science, Designing and Technology (IJISET), Vol. 2, Issue 1, January 2015.
- E.P. Musa and S. Philip, "Mystery Communication Using Picture Steganography", African Journal of Computing and ICT, Vol. 8, September, 2015.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.