Data Encryption and Hiding for Secured Data Transmission

Data Encryption and Hiding for Secured Data Transmission

A. V. Senthil Kumar, Manjunatha Rao, Chennamma H. R., Malavika B.
DOI: 10.4018/978-1-6684-3991-3.ch008
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The secured data hiding for future transfer is an application proposed for a secured data transmission in which the application alters the originality of the file to an encrypted form and embeds that file into a video file which will be transferred. The motive of the application is to provide the ease for the user to pass the information with the encryption standards and algorithms then store the information in an unreadable format. In the next phase, the application has a reverse process where the embedded video can be de-embedded, and the encrypted file can be decrypted to its actual data upon proper user request. In the process of encryption and decryption, the application should confirm the authenticity of the user. The application is generated using the tiny encryption algorithm to encrypt the data. This algorithm is a 64-bit block cipher with a variable length key. The tiny encryption algorithm is used because requires less memory, and as a compliment, it uses only simple operations; thus, it is easy to implement.
Chapter Preview
Top

Introduction

The world is revolving around the data, everything is data from the tiny dust to the huge planets every single atom is data. The data have a vital part in the human life. By means of the decade passes the data increases when the data increases the complexity becomes a threat. In earlier days the communication was done face to face as the time moved the technologies grow wider and many more developments were done. In old times, people used to share the information by talking to each other, and by painting pictures, later it changed to letters and books (M. Hussain, 2018). That was the time of learning new languages, people learned to write and read the paper materials (S. Manimurugan, 2020). Then it became a decade of letters and envelopes, people initially made use of pigeons to give the letters to the expected recipient. After that globe was on another pace to used postal addresses to send the letters. It was the method for a long time (A. K. Sahu & G. Swain, 2019).

Subsequently the letter communication changed to the telecommunication, there arrived the telephone then steadily the telephone was developed to the mobile phone. And when the computer arrived the importance of data increased, as computer needs data for processing. In simple words the data is considered as a raw fact. When data is used for communication, there exists a threat or a vulnerability on the security of the data. This security threat needs an appropriate solution (S. Almutairi, 2019). Thus, implementation of a secure transaction is needed. Data security is the exercise of protective virtual data from a not authorised access, exploitation, or robbery during its whole procedure. It’s an idea that encompasses each thing of data safety from the bodily safety of hardware and garage gadgets to organizational and admission controls, in addition to the rational safety of software program applications(V. Tyagi, 2012). It additionally consists of administrative guidelines and measures. The data security has a next level as data hiding.

Data hiding is a software program improvement approach specially utilized in item-orientated programming to cover inner item particulars (statistics contributors). Data hiding guarantees extraordinary statistics get right of entry to elegance contributors and defends item truthfulness via way of means of stopping accidental or supposed variations. When a communication is performed, suppose that a confidential document is being passed from person A to person B. If person A is sending that document as a simple word file, anyone in the network can perform social engineering and view, manipulate or change the destination and send that file to anyone the intruder thinks. This is why the data security is important (OUSLIM Mohamed, 2013).

Figure 1 illustrates an unsecured data communication. The intruder can manipulate the data by interrupting inside the network. The straight arrow denotes the actual communication which might have happened if the data communication was secured.

Figure 1.
978-1-6684-3991-3.ch008.f01

While data hiding, the application must be capable to handle the security in the transaction. Data transfer refers back to the steady exchange of massive documents among structures or companies. In an inner context, data transfer is regularly utilised as an opportunity to a holistic agency application integration structure. There are numerous methods are invented for secured data transfer but when time goes many secured transfers are being cracked by the hacker (S. Manimurugan, 2020).

Complete Chapter List

Search this Book:
Reset