Abstract

Transportation of information across the internet necessitates security concerns. Internally, transmission of data in organisation must also be secured, according to security standards. In a typical distribution, all traffic transferred via the public network (Internet) is secured. However, sensitive information must not be easily accessible in the event that an attacker compromises any services on the hosts and gains access to their resources. The advancement of information technology has enabled large amounts of digital data to be reliably transported through unrestrained communication channels. Today’s information world is a digital world. Data transmission over an unsecure channel is becoming a major issue of concern nowadays. And at the same time intruders are spreading over the internet and being very active. So to protect the secret data from theft, some security measures need to be taken. In order to keep the data secret various techniques have been implemented to encrypt and decrypt the secret data. Findings of this study show how steganography and cryptography techniques are used for efficient data hiding to prevent unauthorised access to confidential and sensitive information. The study present recommendation for policy and practice. Keywords: Efficiency, Data Hiding Scheme, Steganography, Cryptography, Security

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call