Abstract

The security of data is considered as important issue in any organization. The highly level of security is required to prevent data attacked, damaged or stolen. The online data transfer is rapidly on demand to reduce the costs and time for the organization. This study aims to discuss security approaches that could be adopted in order to secure data transfer online. The literature in the security domain is discussed to determine the most suitable security techniques for the transfer data depends on the data nature, i.e. textual, video, images, or audio data. The discuss shows that techniques such as encrypted data are suitable to safe the textual transfer data. The chaotic map and steganography techniques are suitable to protect the images, video, and audio data. Steganography works to hiding the data in other plain media such as images. The chaotic map works on remapping the data pixel map in order to maximize the complexity of handling the original data by the attackers. It is recommended to offer integration between the security techniques to improve data transfer protection. For example, the data encryption would be supported by other techniques such as a chaotic map, and the steganography can be supported by techniques such as chaotic map. This paper offers important evidences about the security techniques that would be adopted which depends on the nature of data transfer as well as the integration between the techniques to enhance the protection of data transfer. The users or organizations can adopt security techniques according to their data in the environment of working. In the future, the privacy techniques of data transfer would be investigated to prevent the illegal accessing of the data.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.