ARCHIVES
Review on RSA Cryptography, Steganography and Compression Techniques for Data Security
Published Online: January-April 2024
Pages: 17-21
Cite this article
No DOIAbstract
One of the earliest public key cryptosystems still in use for safe data transfer is called RSA (Rivest–Shamir–Adleman). Information hiding is a component of steganography. Since compressed data is easier to handle and more secure, data compression is a crucial component of information security. Efficient, safe, and readily connectable data is produced via effective data compression technology. Compression algorithm approaches come in two flavours: lossy and lossless. These methods are applicable to any type of data format, including audio, video, text, and image files. This study's primary goal was to decrease the amount of physical space on different storage devices and the amount of time it takes to transport data over the Internet while completely guaranteeing that the data would be encrypted and hidden from prying eyes. In this paper, the secret massage is encrypted using RSA cryptography and compressed using Huffman coding. A cover image is compressed using Discrete Wavelet Transform (DWT). The compressed encrypted message is embedded into an image using Least Significant Bit (LSB).
Related Articles
2024
Revolutionizing User Interfaces: Exploring the Latest Trends in Front-End Development
2024
Website Development in Computer Science: Unveiling the Digital World
2024
Stock Price Prediction Using LSTM
2024
Comparative Analysis of Program Execution Time Required by Python, R and Julia Compiler
2024
Online Auction App
2024