Please use this identifier to cite or link to this item:
http://ir.lib.seu.ac.lk/handle/123456789/3025
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shafana, A.R.F. | - |
dc.date.accessioned | 2018-02-19T09:35:29Z | - |
dc.date.available | 2018-02-19T09:35:29Z | - |
dc.date.issued | 2017-12-07 | - |
dc.identifier.citation | 7th International Symposium 2017 on “Multidisciplinary Research for Sustainable Development”. 7th - 8th December, 2017. South Eastern University of Sri Lanka, University Park, Oluvil, Sri Lanka. pp. 97-103. | en_US |
dc.identifier.isbn | 978-955-627-120-1 | - |
dc.identifier.uri | http://ir.lib.seu.ac.lk/handle/123456789/3025 | - |
dc.description.abstract | Delivery of unapparent information through visual streams has always been a challenging task in this Information Era. Encryption has been assisting to hide the information over the decades, however, the drastic development in technology, has indeed jeopardized the security obtained in that approach by utilizing the backdoors of such encryption algorithms. In that juncture, to hide the existence of data itself, Steganography techniques were later introduced. This paper has combined the use of both mechanisms to ensure the secrecy, security, privacy and confidentiality of sensitive data, which first encrypts the sensitive data and later conceal it in a carrier media. The encryption is done through AES256 algorithm and Digital Images are used as carrier multimedia. At first, sensitive data are encrypted using AES256 algorithm. By employing the popular and secure Least Significant Bit (LSB) approach in Steganography, the encrypted messages are randomly embedded within a digital image to be perceived as general White Noises. The use of both mechanisms have made the process of unintended access even complicated because, though the image was suspected to contain any secret messages there is still complexity to track the cipher. Thus, this two-tier security system could be a low-cost, feasible solution to hide the secret messages in Personal Computers. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | South Eastern University of Sri Lanka, University Park, Oluvil, Sri Lanka. | en_US |
dc.subject | Steganography | en_US |
dc.subject | Cryptography | en_US |
dc.subject | AES256 | en_US |
dc.subject | Least significant bit | en_US |
dc.title | Two tier shield system for hiding sensitive textual data | en_US |
dc.type | Article | en_US |
Appears in Collections: | 7th International Symposium - 2017 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ID 053.pdf | 606.22 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.