Abstract

The businesses in various fields use the online communication application to gather their data and information with local and global sources. The gathered data may sensitive such as the financial and businesses development information. The hackers or online thief try to stole the valuable data i.e. credit card numbers. The organizations looking for secure online channels in order to transfer their data efficiently and avoid the data thieving. One of the most applicable methods that developed to secure the online transferred data is the cryptography which transfers the original data or information to encrypted formulation. Cryptography still has many drawbacks such as stole and decrypts the original texts using automatic decryption counter. The main aim of this research is to improve the cryptography securing level using supportive method which is Steganography. The Steganography is the processes of hide the data or information in media files such as video, images and audio files. There are four stages represent the methodology of this paper; (1) encrypt the original texts using RSA algorithm, (2) hide the encrypted texts in Image files, (3) extract the encrypted texts from Image files, and (4) decrypt the original texts using decryption key of RSA algorithm. It is expected to improve the security level of the online transferred textual data. The performance of the final results will be evaluated through compare the Image files quality before and after hide the data in these files. The quality of the original and stego Image files need to be same or near in order to maximize the difficulty of detect that there data hide in these files.

Highlights

  • This Nowadays, the internet and communication applications pro-vide many advantages such as transfer the data and information at real time and online conferences [11;21]

  • There are four stages represent the methodology of this paper; (1) encrypt the original texts using RSA algorithm, (2) hide the encrypted texts in Image files, (3) extract the encrypted texts from Image files, and (4) decrypt the original texts using decryption key of RSA algorithm

  • After the sender receives the public key, n value and MAC address from the recipient becomes able to manage the encrypting and hiding process through available selection Encrypt button on the interface that is prepared for this purpose The sender will determine many inputs that are needed to perform this process by insert the public key e, value n and MAC-Address of the recipient. The both public key e and value n of the recipient using to encrypt message by RSA algorithm, but the MAC-Address of the recipient hide in the cover file to verify from the Recipient

Read more

Summary

Introduction

This Nowadays, the internet and communication applications pro-vide many advantages such as transfer the data and information at real time and online conferences [11;21] This wide increasing in the online applications in various fields such as financial, govern-mental and social fields maximize the importance of secure the channels that used to transfer the data through internet network [20; 17]. It has become more critical to our day-to day life because thousands of people interact electronically every day; through e mail, e-commerce, ATM machines, cellular phones, etc This geometric increase of information transmitted electronically has made increased reliance on cryptography and authentication by users [9]

Objectives
Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.