首页    期刊浏览 2024年12月03日 星期二
登录注册

文章基本信息

  • 标题:An Approach to Hiding of Encrypted Text Information behind Word Document File
  • 本地全文:下载
  • 作者:Neha Gupta ; Prof. Manoj Sharma
  • 期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
  • 印刷版ISSN:2277-6451
  • 电子版ISSN:2277-128X
  • 出版年度:2013
  • 卷号:3
  • 期号:11
  • 出版社:S.S. Mishra
  • 摘要:The need to secure computer systems is well understood and securing data must be part of an overall computer security plan. Growing amounts of sensitive information are being retained in files and more of these files are being made accessible via the Internet. As more information is made available electronically/digitally, it can be assumed that vulnerabilities and threats to the integrity of that information will increase as well. Info rmation security is becoming an increasingly important area and need to develop core understandings in this area. The primary objectives of information security are to prevent unauthorized access to information, prevent unauthorized tampering or modification of information, and to insure that information remains available when need ed. The concepts related to information security are multifaceted. People need to use the cryptographic operations in order to keep the personal sensitive information files to avert from foreigners in consideration of the security. The algorithm include bunch of to protect the attacks of foreigners to reach and read personal files that is located in personal computer or the owner would like to send somewhere or other location. Cryptographic consist of encryption and decryption techniques in computer and computer networking. In effort to keep information's in safety such as banking account information's or to provide file transaction without any problem such as password sharing caused such a security methods. This report describes what features are in the scope of the research and what are not in the scope of the research to be developed. Basically proposed work is dual security approach over confidential information. In this text information encrypted through encryptio n process then this encrypted information hide behind a word file. At other end extract encrypted information from encrypted cover file and then decrypted these information through decryption process to get original information
  • 关键词:Information security; Encryption; Decryption; Cryptography; Symmetric; Asymmetric; Key; Algorithm
国家哲学社会科学文献中心版权所有