skip to main content
research-article
Free Access

Triple layer data security

Authors Info & Claims
Published:29 April 2008Publication History
Skip Abstract Section

Abstract

The growth of high speed computer networks and that of Internet, in particular, has hiked the ease of Data Communication. But in the other hand this growth is also responsible for the snooping of Data at the same time. The ease, by which digital information can be duplicated and distributed, has led to the need for effective protection tools. Various encryption techniques like cryptography, digital watermarking, steganography etc have already been introduced in attempt to address these growing concerns. In this paper, an algorithmic approach is proposed in which along with the combination of cryptography and steganography (taken as security layers), an extra layer of security has been imposed in between them to obtain a completely secured data transmission scheme.

References

  1. Alfred. J. Menezes, Paul. C. Van Oorschot, Scott A. Venstone, Handbook of Applied Cryptography. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Niels Provos, Peter Honeyman, Hide and seek: Introduction to Steganography. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Neil F. Johnson and Sushil Jajodia, Exploring Steganography: seeing the unseen.Google ScholarGoogle Scholar
  4. Stefan Katzenbeisser, Fabien, A. P. Information Hiding Techniques for Steganography and Digital Watermarking. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Andreas Westfield, F5-A Steganography Algorithm.Google ScholarGoogle Scholar

Index Terms

  1. Triple layer data security

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          HTML Format

          View this article in HTML Format .

          View HTML Format