IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Novel Approach Using Steganography and Cryptography in Business Intelligence

A Novel Approach Using Steganography and Cryptography in Business Intelligence
View Sample PDF
Author(s): Sabyasachi Pramanik (Haldia Institute of Technology, India), Ramkrishna Ghosh (Haldia Institute of Technology, India), Mangesh M. Ghonge (Sandip Institute of Technology and Research Centre, India), Vipul Narayan (MMM Collage, Gorakhpur, India), Mudita Sinha (CHRIST University, India), Digvijay Pandey (Department of Technical Education, U. P., India)and Debabrata Samanta (CHRIST University (Deemed), India)
Copyright: 2021
Pages: 26
Source title: Integration Challenges for Analytics, Business Intelligence, and Data Mining
Source Author(s)/Editor(s): Ana Azevedo (CEOS.PP, ISCAP, Polytechnic of Porto, Portugal)and Manuel Filipe Santos (Algoritmi Centre, University of Minho, GuimarĂ£es, Portugal)
DOI: 10.4018/978-1-7998-5781-5.ch010

Purchase

View A Novel Approach Using Steganography and Cryptography in Business Intelligence on the publisher's website for pricing and purchasing information.

Abstract

In the information technology community, communication is a vital issue. And image transfer creates a major role in the communication of data through various insecure channels. Security concerns may forestall the direct sharing of information and how these different gatherings cooperatively direct data mining without penetrating information security presents a challenge. Cryptography includes changing over a message text into an unintelligible figure and steganography inserts message into a spread media and shroud its reality. Both these plans are successfully actualized in images. To facilitate a safer transfer of image, many cryptosystems have been proposed for the image encryption scheme. This chapter proposes an innovative image encryption method that is quicker than the current researches. The secret key is encrypted using an asymmetric cryptographic algorithm and it is embedded in the ciphered image using the LSB technique. Statistical analysis of the proposed approach shows that the researcher's approach is faster and has optimal accuracy.

Related Content

Dina Darwish. © 2024. 48 pages.
Dina Darwish. © 2024. 51 pages.
Smrity Prasad, Kashvi Prawal. © 2024. 19 pages.
Jignesh Patil, Sharmila Rathod. © 2024. 17 pages.
Ganesh B. Regulwar, Ashish Mahalle, Raju Pawar, Swati K. Shamkuwar, Priti Roshan Kakde, Swati Tiwari. © 2024. 23 pages.
Pranali Dhawas, Abhishek Dhore, Dhananjay Bhagat, Ritu Dorlikar Pawar, Ashwini Kukade, Kamlesh Kalbande. © 2024. 24 pages.
Pranali Dhawas, Minakshi Ashok Ramteke, Aarti Thakur, Poonam Vijay Polshetwar, Ramadevi Vitthal Salunkhe, Dhananjay Bhagat. © 2024. 26 pages.
Body Bottom