UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 7 Issue 12
December-2020
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIREJ06032


Registration ID:
304913

Page Number

146-150

Share This Article


Jetir RMS

Title

Secure Data using 2-steps Encryption and Steganography to avoid Data theft.

Abstract

Data Security is the most important concern in the terms of modern communicating era. Encryption is the best and the effective way to provide data security and privacy. Most of the modern encryption systems are based on only one step of encryption and decryption which have some drawbacks of data theft but in this application, we have used two step encryption and decryption for better security. In this application, we have used one custom encryption and decryption method and also Advance Encryption Standard. Advance Encryption Standard is based on a principle known as a substitution–permutation network, and is very use full in hardware and software. We have also used Steganography it is the technique which is used to hide the secret data into an ordinary or non-secret file to avoid detection. Steganography can be combined with encryption technique to provide an extra step for protection. In this application we can hide a secret message into an ordinary image and also do text encryption and decryption.

Key Words

Encryption,Decryption,Steganography,Secure,Data,Two Steps,AES.

Cite This Article

"Secure Data using 2-steps Encryption and Steganography to avoid Data theft.", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 12, page no.146-150, December-2020, Available :http://www.jetir.org/papers/JETIREJ06032.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Secure Data using 2-steps Encryption and Steganography to avoid Data theft.", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 12, page no. pp146-150, December-2020, Available at : http://www.jetir.org/papers/JETIREJ06032.pdf

Publication Details

Published Paper ID: JETIREJ06032
Registration ID: 304913
Published In: Volume 7 | Issue 12 | Year December-2020
DOI (Digital Object Identifier):
Page No: 146-150
Country: -, -, - .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003092

Print This Page

Current Call For Paper

Jetir RMS