Concealing And Encrypting: Dual Approaches to Data Security in The Digital Age

Authors

  • Ananya Mishra Department of Computer Science, MRU, Faridabad-Haryana, 221010, India. Author
  • Madhav Aggarwal Department of Computer Science, MRU, Faridabad-Haryana, 221010, India. Author
  • Akshat Tiwari Department of Computer Science, MRU, Faridabad-Haryana, 221010, India. Author

DOI:

https://doi.org/10.47392/IRJAEM.2024.0368

Keywords:

Masking, Cryptography, Steganography, Data Security

Abstract

Ensuring data security is a paramount concern in the contemporary digital landscape, given the rapid advancements in internet technology leading to a substantial surge in online transfer of both textual and multimedia information. The current modes of communication lack robust security measures, making data vulnerable to unauthorized access during transmission. Recognizing the critical importance of safeguarding electronic data, both public and private sectors employ various procedures and methods. Among the prominent technologies employed for data security are cryptography and steganography. Cryptography involves the art of encrypting information to hide its readable and significant contents, whereas steganography is a technique used to conceal data within a cover media, effectively masking the very existence of the data. It is imperative for organizations to adopt and integrate these security technologies to mitigate the risks associated with unauthorized data access and ensure the integrity of sensitive information.

Downloads

Download data is not yet available.

Downloads

Published

2024-08-13