Author : Mr. M.Hareesh Babu, 1
Date of Publication :7th March 2015
Abstract: with the increase in Internet Technologies, great amount of information is following electronically everyday over the network. Information security is a way to protect information against its confidentiality, reliability and availability. Hiding exchange of information is an important factor in the field of security. Cryptography and Steganography are two very important methods for this purpose and are both used to ensure data confidentiality. In Steganography a cover media is used to hide the existence of data where cryptography is used to protect information by transferring plain text into cipher text. Here we discusses some proposed methods, implementations of different embedding techniques and two different ways for hiding data and also a comparative analysis is made based upon some security variables. Text Steganography is applied on XML files and is further encrypted using a cryptographic algorithm.
Reference :
-
- Shingo, Kyoko, Ichiro, Osamu, “A Proposal on Information Hiding Methods using XML”, Mitsubishi Research Institute, Communication Research Laboratory, Yokohama National University and The University of Tokyo.
- Mohammad Laheen, Sun XingMing, “Techniques with Statistics for Web page Watermarking” 2005, NSFC No.60373062
- Aasma, Sumbul, Asadullah, “Steganography: A New Horizon for Safe Communication through XML”, 2005
- http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
- http://www.infosecwriters.com/text_resources/pdf/Stegan ography_AMangarae.pdf