A Novel Approach of Secure Communication: Encryption Based Compression Technique

Mr. Aajam Sheikh, Dr.Prashant Panse

Abstract


Transmission of information through a problematic channel for communication assumes an essential job in the present period subsequently communication security over an overall system turning into a most rising point. Different advances have been acquainted with satisfy this need Cryptography and Steganography are two strategies in this period. Cryptography method distorts the information so that separated from proposed client nobody can get to it. Be that as it may, it is having an impediment that in this system message exist in encoded however noticeable shape. So malicious user keeps trying to decrypt that message and once it is decrypted it reveals its identity. Hence Steganography has been introduced to overcome the limitation of Cryptography. For secure communication various compression techniques are available which are described below.


Full Text:

PDF

References


PritamKumari, Chetna Kumar, Preeyanshi, Jaya Bhushan, “Data Security Using Image Steganography And Weighing Its Techniques,” in international Journal Of Scientific & Technology Research Volume 2, Issue 11, November 2013,pp. 238-241.

M. Prasad, "Basic Concepts of communication," 24 December 2012. [Online]. [Accessed Admin at max Embedded IT University, Vellore].

J. G. Daugman, "The communication Vision Homepage," Carnegie Mellon University. [Online]. Available: http://www-2.cs.cmu.edu/_cil/vision.html.

http://expertedge.aje.com/2012/05/21/figures-and-file-types-the-basics.

Rina Mishra, DeepikaDongre, “A research review on data security rationale,” in national conference on national conference on Innovative trends in engineering sciences & management 2014.

Shahana T, “An Enhanced Security Technique for Steganography Using DCT and RSA,” in international Journal of Advanced Research in Computer Science and Software Engineering,Volume 3, Issue 7, July 2013,pp. 943-949.

RamadhanMstafa, Christian Bach, “Information Hiding in Images Using Steganography Techniques,” in ASEE Northeast Section Conference 2013.

Saeed Ahmed Sohag, Dr. Md. Kabirul

Islam, Md. Baharul Islam,“A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key,” in American Journal of Engineering Research (AJER), Volume-02, Issue-09, pp-118-126.

Dr.S.Vijayarani, Mrs.M.Vinupriya, “Performance Analysis of Canny and Sobel Edge Detection Algorithms in Image Mining,” in International Journal of Innovative Research in Computer and Communication Engineering,Vol. 1, Issue 8, October 2013, pp. 1760-1767.

Uvika,SumeetKaur, “A Comprehensive Review On Different Edge Detection Techniques,” in An International Journal of Engineering Sciences ISSN: 2229-6913 Issue July 2012, Vol. 6, pp. 162-169.

SnehaArora, SanyamAnand, ”A Proposed Method for Image Steganography Using Edge Detection,” in International Journal of Emerging Technology and Advanced Engineering,Volume 3, Issue 2, February 2013,pp. 296-297.

Tara Bansal, RuchikaLamba, “Steganography Using Various Quantization Techniques: A Review,” in International Journal of Advanced Research in Computer Science and Software Engineering, July- 2013, pp. 26-30.


Refbacks

  • There are currently no refbacks.