Show simple item record

dc.contributor.authorAnudini, AKSA
dc.contributor.authorGayamini, G.
dc.contributor.authorWeerawardane, TL
dc.date.accessioned2023-06-27T07:46:59Z
dc.date.available2023-06-27T07:46:59Z
dc.date.issued2022
dc.identifier.urihttp://ir.kdu.ac.lk/handle/345/6406
dc.description.abstractData and information can be considered the most precious assets in electronic communication systems, but security has become a struggle in this competitive world. Cloud computing has emerged as the most exciting technology for on-demand computing. It is now used by the military, healthcare, education, finance, and various other organizations to handle their large volume of information. Cloud computing has many benefits, including efficiency, high performance, scalability, accessibility, backup, and recovery. Security is a primary concern in cloud computing because everyone in the organization shares the same cloud platform. The most significant issue for the user is securely saving, retrieving, and transmitting data through the cloud network and storage. Cryptography and steganography can be defined as the most popular techniques that can be used to enhance data security. Cryptography scrambles the messages into an unintelligible format, while steganography hides the message as it is not observable to the attacker. High-level security is given for both the sender and the receiver inside the cloud platform when cryptography is used along with steganography. This paper analyzes the performance of cryptographic and steganographic techniques and suggests the best hybrid cryptographic algorithms and multilayer steganographic techniques that can be combined for efficient and secure data transmission in the cloud. This proposed system will provide availability, integrity, authenticity, confidentiality, and non-repudiation to the data and information.en_US
dc.language.isoenen_US
dc.subjectAsymmetric Key Cryptographyen_US
dc.subjectCryptographyen_US
dc.subjectImage Steganographyen_US
dc.subjectSteganographyen_US
dc.subjectSymmetric Key Cryptographyen_US
dc.titleComparison Analysis and Systematic Study on Secure Transmission of Data in the Cloud Using Steganographic Techniques and Cryptographic Algorithmsen_US
dc.typeArticle Full Texten_US
dc.identifier.facultyComputingen_US
dc.identifier.journalKDU IRC 2022en_US
dc.identifier.pgnos43-51en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record