High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Improvement of Hybrid Technique of Data Security

Author(s):

Shishupal Sidar , National Institute of Technology, Kurukshetra; Gourav Chandel, National institute of technology; Deepak Garg, National Institute of Technology

Keywords:

Encryption, Steganography, Compression, Cryptography, Data Security, Decryption

Abstract

At the present times, somewhere the lot seems like it should be digitized, danger to the security of data is at the peak level. Data is careful as an important strength then is essential to be secure. Data Security contains data, authenticity, integrity, and confidentiality besides considerable more. In the face of some approaches toward data security like encryption, compression, steganography, the data is static and likely to have prospective safety threats. The chief motive acknowledged is the shortcomings of these separate techniques at what time sure factors are occupied addicted to account. Cryptography certifies security then it also produces suspicion just before data as the data is transformed into worthless form. Compression techniques protect and encrypt data space on disk so compressed records can without difficulty to uncompress through attackers. Steganography is a method which is used to hide information rather than encrypting this one also has its advantages and limitations. In this paper, we tried to focus on devising an organization which not alone make available multilayer information security but then again also tends to cross those techniques after Encryption, compression and steganography that forms a safety system actually hard to break but at the similar period keeping computational speed as fast as imaginable keeping in mind the plainness of the approaches selected. For completing this assignment, approaches aimed at security of data (Encryption, Compression, and Steganography) and their possible merits and drawbacks remained assessed in point. Data security differentiation of these techniques will be there planned successfully.

Other Details

Paper ID: IJSRDV8I120066
Published in: Volume : 8, Issue : 12
Publication Date: 01/03/2021
Page(s): 91-94

Article Preview

Download Article