acm - an acm publication

Articles

Triple layer data security

Ubiquity, Volume 2008 Issue April | BY Swarnendu Mukherjee , Swarnendu Bhattacharya , Amlan Chaudhury 

|

Full citation in the ACM Digital Library

The growth of high speed computer networks and that of Internet, in particular, has hiked the ease of Data Communication. But in the other hand this growth is also responsible for the snooping of Data at the same time. The ease, by which digital information can be duplicated and distributed, has led to the need for effective protection tools. Various encryption techniques like cryptography, digital watermarking, steganography etc have already been introduced in attempt to address these growing concerns. In this paper, an algorithmic approach is proposed in which along with the combination of cryptography and steganography (taken as security layers), an extra layer of security has been imposed in between them to obtain a completely secured data transmission scheme.


Swarnendu Mukerjee, Swarnendu Bhattacharya, and Amlan Chaudhury of the Heritage Institute of Technology in Kolkata, India propose an algorithmic approach to data security in which. along with the combination of cryptography and steganography (taken as security layers), an extra layer of security is imposed in between them to obtain a completely secured data transmission scheme.

[This article is available as a PDF only.]

Source: Ubiquity Volume 9, Issue 17 (April 29, 2008 - May 5, 2008)



Forum

Printer Friendly Version





[Home]   [About Ubiquity]   [The Editors]  


Ubiquity welcomes the submissions of articles from everyone interested in the future of information technology. Everything published in Ubiquity is copyrighted �2008 by the ACM and the individual authors.

COMMENTS

POST A COMMENT
Leave this field empty