Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      1 Jan 2023, Volume 38 Issue 1   
    Article

    1. SECURE FRAMEWORK FOR CYBER DATA USING CRYPTOGRAPHIC AND STEGANOGRAPHIC ALGORITHMS
    Bhawna1, Dr. Sanjay Malik2
    Journal of Data Acquisition and Processing, 2023, 38 (1): 3668-3682 . 

    Abstract

    The e-commerce industry has recently seen enormous growth on a global scale. Due to the rising popularity of online shopping, consumers, businesses, and depository financial institutions are extremely worried about debit/credit card fraud and the protection of personal information. It is essential to prevent unwanted access to and use of the information since it is disseminated over insecure channels. Cryptography and steganography are most frequently employed to avoid unauthorized access to sensitive data. However, the combined qualities of these two approaches are not secure enough in the modern world. It might lead to some vulnerability. It is possible to add additional layers of protection and achieve high levels of information security if visual cryptography is used in conjunction with the abovementioned combination. This research work proposed a multi-level information security framework for cyber data using random public key cryptography for the secret text, color image steganography for concealing secret encrypted text in the cover image, visual cryptography for slicing the cover image into two shares, and image steganography again to hide both the shares into two color images, respectively. These security processes significantly increase the confidentiality, dependability, and efficiency of secret messages. While there isn't a parameter to demonstrate the level of security achieved using cutting-edge techniques, the accuracy of the received text data is calculated in terms of MSE and correlation coefficient by comparing the sent and received text data. To evaluate the effectiveness of the suggested strategy, the time required at the transmitter and receiver ends is also calculated. The MATLAB environment is utilized in the implementation, demonstrating that the suggested system has improved robustness when considering steganalysis.

    Keyword

    Encryption, Decryption, Cryptography, Steganography


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved