
Comparative Study Of Efficient Data Hiding Techniques
Author(s) -
Lalan Kumar,
Debadutta Mishra,
Ayush Kumar,
Amit Kumar,
Ashish Bajpai
Publication year - 2021
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/1022/1/012047
Subject(s) - computer science , cryptography , encryption , data security , computer security , information hiding , credibility , theoretical computer science , image (mathematics) , artificial intelligence , political science , law
Data security is one of the fundamental concerns when it comes to modern networking and information sharing as any breach or data loss can end up causing major losses in terms of credibility, personal data and/or law suites. This paper studies data encryption and decryption techniques using algorithms like DES algorithm, 3 DES algorithm, AES algorithm and RSA algorithm. Cryptography was introduced for data security while transmitting data. However, only cryptography cannot give a robust security approach; as a result, a disorganized message can still be snooped [9]. This leads to a desire for information security. There are several techniques available, among those have taken a few of them and will review them considering cryptography measures. We will analyse the algorithm mentioned above, and try to find out better among them.