
Confidentiality of Data using Hash Function
Author(s) -
K. Ramprakaash,
Seshadri Ramkumar,
Rahul Santhosh,
P. Shanmuga Priya
Publication year - 2021
Publication title -
international journal of scientific research in science and technology
Language(s) - English
Resource type - Journals
eISSN - 2395-602X
pISSN - 2395-6011
DOI - 10.32628/ijsrst218486
Subject(s) - computer science , hash function , cryptographic hash function , steganography , encryption , communication source , sha 2 , cryptography , secure hash algorithm , authentication (law) , hash chain , computer network , message authentication code , data security , theoretical computer science , computer security , embedding , artificial intelligence
Steganography and Cryptography are two major fields which is widely used for data security. With the help of these technologies, data security is provided in banking system. In the proposed method, the online transactions are done virtually using hash function. Encryption of data is done by using the cryptographic hash function algorithm. The proposed approach implements an efficient algorithm for embedding the data in an image using steganography which provides the better security pattern for sending messages through a network. The authentication details of the sender and the receiver is hidden to achieve a secure transmission. The proposed approach provides better integrity and confidentiality. This paper implemented a novel methodology which can be used as a secure and highly efficient method of data hiding and data extracting.