NORMA eResearch @NCI Library

Using cryptography and image steganography to securely transfer data. (REPORT)

Lathigara, Yash (2021) Using cryptography and image steganography to securely transfer data. (REPORT). Masters thesis, Dublin, National College of Ireland.

[thumbnail of Master of Science]
Preview
PDF (Master of Science)
Download (673kB) | Preview
[thumbnail of Configuration manual]
Preview
PDF (Configuration manual)
Download (519kB) | Preview

Abstract

When Computer apps were built to deal with financial and personal information, the need for security grew. Data on PCs is a very important aspect of front-line life. Today, security is so important that we must safely transfer information from one location to another. There is a big hacker and spire on the other side of the heavy security. Cryptography is one of the concepts that is concerned with security and plays a significant role in today's secure communication environment. However, the difficulty with cryptography is that an intruder will be aware that the data is encrypted and may attempt to decrypt it using a specific set of keys.

One of the reasons attackers are so effective is that most of the data they hack or extract from a system is in a format that they can read, update, and change. Intruders may disclose the information to others, modify it to misrepresent an individual or organization, or use it to conduct an attack. The use of steganography is one solution to this problem.

Item Type: Thesis (Masters)
Subjects: Q Science > QA Mathematics > Electronic computers. Computer science
T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science
Q Science > QA Mathematics > Computer software > Computer Security
T Technology > T Technology (General) > Information Technology > Computer software > Computer Security
Divisions: School of Computing > Master of Science in Cyber Security
Depositing User: Tamara Malone
Date Deposited: 19 Dec 2022 17:59
Last Modified: 19 Dec 2022 17:59
URI: https://norma.ncirl.ie/id/eprint/6018

Actions (login required)

View Item View Item