📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 8, ISSUE 4, APRIL 2019

Cryptography Technique for Information Security

Priyanka S. Pandhare, Pallavi S. Raut, Shital S. Patil, Pranjali T. Pawar

DOI: 10.17148/IJARCCE.2019.8453
Abstract:  In today's computer world security, integrity, the confidentiality of the organization data is the most important issue. The confidentiality of data files which is transmitted over the internet. Data encryption is widely used to ensure the security of the data files. In the existing system, the image was hiding in the image they are using watermarking for image hiding. In the proposed system we are using DES, Run length encoding and steganography techniques for providing security to the secret data files. This system not only embeds the secret data files like text, image, audio, video in the image but also embed that secret data files in a cover data files like image, audio, video, etc. By using these Techniques third parties cannot percept the existence of secret data embedded in the cover files such as image, audio, video. The properties of the cover data file remain the same after hiding the secret data files. The goal of steganography is to avoid suspicion to the transmission of hidden message, such that it is highly secured.  For secret data files compression Run-length encoding technique used. Run-length encoding (RLE) is a very simple form of lossless data compression in which runs of data are stored as a single data value and count, rather than as the original run. Security is provided by Encrypting the secret data files that are embedded in cover data files using the DES algorithm.

Keywords: Steganography, DES, Run Length Encoding, Compression

How to Cite:

[1] Priyanka S. Pandhare, Pallavi S. Raut, Shital S. Patil, Pranjali T. Pawar, “Cryptography Technique for Information Security,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2019.8453