A Survey on Secured Data Transmission Using RSA Algorithm and Steganography

Authors

  • Rajat Asreddy  Student, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan, Savitribai Phule Pune University, Pune, Maharashtra, India
  • Avinash Shingade  Student, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan, Savitribai Phule Pune University, Pune, Maharashtra, India
  • Niraj Vyavhare  Student, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan, Savitribai Phule Pune University, Pune, Maharashtra, India
  • Arjun Rokde  Student, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan, Savitribai Phule Pune University, Pune, Maharashtra, India
  • Yogesh Mali  Assistant Professor, Department of Computer Engineering, Dr. D. Y. Patil School of Engineering, Lohegoan, Savitribai Phule Pune University, Pune, Maharashtra, India

Keywords:

Cryptography, RSA, Encryption, Unscrambling, Steganography.

Abstract

Conceptual In the cutting edge world, there is a need of high security of media information. This verified framework ought to give classification, genuineness, respectability and non-disavowal in the system. The private subtleties moved through web are hacked by phishing in an electronic correspondence world. So data security plays a significant job. The Cryptographic calculations are applied over numerous applications for secure transmission of information against dangerous assaults. Steganography is utilized to conceal their reality. Rivest-Shamir-Adleman (RSA) is an awry cryptographic, profoundly verified calculation. Since it is mind boggling to process, extraordinary strategies are applied to build the speed of a RSA calculation. This paper proposed a strategy to upgrade the security of correspondence by consolidating cryptography and steganography strategies. The proposed framework is progressively productive in verifying information from unapproved clients.

References

  1. M.Rajkamal and B.S.E. Zoraida, "Picture and Text Concealing utilizing RSA and Blowfish Algorithms with Hash- LSB Technique", International Journal of Innovative Science, Engineering and Technology, Vol. 1 Issue 6,August 2014.
  2. Sarthak R Patel, Prof. Khushbu Shah, and Gaurav R Patel, "Concentrate on Improvements in RSA Algorithm", Worldwide Journal of Engineering Development and Research, 2014.
  3. Israt Jahan, Mohammad Asif, Liton Jude Rozario, "Improved RSA cryptosystem dependent on the investigation of number hypothesis and open key cryptosystems", American Diary of Engineering Research (AJER), Vol 4, Issue 1, 2015.
  4. Amare Anagaw Ayele and Dr. Vuda Sreenivasarao, "A Altered RSA Encryption Technique Based on Multiple open keys", International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 4, June 2013.
  5. Dr. Abdulameer K. Hussain, "A Modified RSA Calculation for Security Enhancement and Redundant Messages Elimination Using K-Nearest Neighbor Calculation", International Journal of Innovative Science, Designing and Technology (IJISET), Vol. 2, Issue 1, January 2015.
  6. E.P. Musa and S. Philip, "Mystery Communication Using Picture Steganography", African Journal of Computing and ICT, Vol. 8, September, 2015.

Downloads

Published

2019-10-30

Issue

Section

Research Articles

How to Cite

[1]
Rajat Asreddy, Avinash Shingade, Niraj Vyavhare, Arjun Rokde, Yogesh Mali, " A Survey on Secured Data Transmission Using RSA Algorithm and Steganography, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 8, pp.159-162, September-October-2019.