Academia.eduAcademia.edu

Outline

An Insight of Information Security: A Skeleton

2019, International Journal of Recent Technology and Engineering (IJRTE)

https://doi.org/10.35940/IJRTE.C4922.098319

Abstract

In this age of growing and developing information and technology, data security, integrity and confidentiality are essential aspects related to shared data over some network or medium. Many techniques over the years have been developed for securing the messages from attack or theft or breach of very sensible and essential data when shared over a network. The security threats to data have been ascending, so are the data hiding or securing techniques. This is where Information Security has a role to play. Development of techniques and methods that prevents the essential and secret data being stolen and thus providing security to the data. This paper discusses the significance of Information Security, its evolution since its infant stage and study about various subdomains of the same. This paper also shows a comparative study of various Information Security Techniques, their pros and cons and the applications in various domains. This paper analyses various Information Security methods ...

References (25)

  1. Sridhar, K., Dr Syed Abdul Sattar, and M. Chandra Mohan. "Comparison of digital watermarking with other techniques of data hiding." International Journal of Computer Science and Information Technologies (IJCSIT) 5.1 (2014): 350-353.
  2. Kirovski, D., & Malvar, H. S. (2003). Spread-spectrum watermarking of audio signals. IEEE transactions on signal processing, 51(4), 1020-1033.
  3. Rivest, Ronald L., Adi Shamir, and Leonard Adleman. "A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21.2 (1978): 120-126.
  4. Bellare, M., Desai, A., Jokipii, E., & Rogaway, P. (1997, October). A concrete security treatment of symmetric encryption. In Proceedings 38th Annual Symposium on Foundations of Computer Science (pp. 394-403). IEEE.
  5. Febryan, Aryfandy, Tito Waluyo Purboyo, and Randy Erfa Saputra. "Steganography Methods on Text, Audio, Image and Video: A Survey." International Journal of Applied Engineering Research 12.21 (2017): 10485-10490.
  6. Dobsicek, Microslav. "Modern Steganography." 8th International Student Conference on Electrical Engineering FEE CTU. 2004.
  7. Por, Lip Yee, and B. Delina. "Information hiding: A new approach in text steganography." WSEAS International Conference. Proceedings. Mathematics and Computers in Science and Engineering. No. 7. World Scientific and Engineering Academy and Society, 2008.
  8. Pawar, Sagar S., and Vinit Kakde. "Review on Steganography for Hiding Data." International Journal of Computer Science and Mobile Computing 4 (2014): 225-229.
  9. Gunjal, Monika, and Jasmine Jha. "Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish
  10. Algorithm." International Journal of Computer Trends and Technology (IJCTT) 11.4 (2014): 144-150.
  11. Nick Sterling, Sarah Wahl, Sarah Summers, "Spread Spectrum Steganography"
  12. Osuolale, A. Festus, "Secure data transfer over internet using Image CryptoSteganography" International Journal of Scientific and Engineering Research, December 2017
  13. Surekha, B., and G. N. Swamy. "A spatial domain public image watermarking." International Journal of Security and Its Applications 5.1 (2011): 1-12.
  14. Catorcini, Alessandro, et al. "Digital signatures with an embedded view." U.S. Patent No. 7,568,101. 28 Jul. 2009.
  15. Cheddad, Abbas, et al. "Digital image steganography: Survey and analysis of current methods." Signal processing 90.3 (2010): 727-752.
  16. Podilchuk, Christine I., and Edward J. Delp. "Digital watermarking: algorithms and applications." IEEE signal processing Magazine 18.4 (2001): 33-46.
  17. Stallings, William. Cryptography and network security, 4/E. Pearson Education India, 2006.
  18. Doshi, Ronak, Pratik Jain, and Lalit Gupta. "Steganography and its applications in security." International Journal of Modern Engineering Research (IJMER) 2.6 (2012): 4634-4638.
  19. Orooba Ismaeel Ibraheem Al-Farraji, "Hiding the Results of Medical Test in Medical Digital Image" International Journal of Engineering Research and General Science Volume 3, Issue 5, September-October, 2015
  20. N. Suganya, M. Marimuthu, "ECG Steganography Based Privacy Protecting Of Medical Data for Telemedicine Application" International Journal of Innovative Research in Computer and Communication Engineering, March 2014
  21. Manish Trehan, Pawan Kumar, "Hiding Data in X-Ray Scanned Images Using Both Steganography & Cryptography Tecniques" International Journal of Emerging Research in Management &Technology, Spetember 2017
  22. Latika, "A Comparative Study of Cryptography, Steganography and Watermarking", Journal of Emerging Technologies and Innovative Research, May 2015
  23. Pranali R. Ekatpure, Rutuja N. Benkar, "A Comparative Study of Steganography & Cryptography", International Journal of Science and Research, 2013
  24. Patel N., Oza P., Agrawal S. (2019) Homomorphic Cryptography and Its Applications in Various Domains. In: Bhattacharyya S., Hassanien A., Gupta D., Khanna A., Pan I. (eds) International Conference on Innovative Computing and Communications. Lecture Notes in Networks and Systems, vol 55. Springer, Singapore
  25. Parita Oza, Vishakha Khatrecha, Pooja Malvi, "Encryption Algorithm using Rubik's Cube Principle for Secure Transmission of Multimedia Files", International Conference on Multidisciplinary Research & Practice 2016