This paper is published in Volume-6, Issue-3, 2020
Area
Data Security
Author
Shishupal Sidar, Gourav Chandel, Deepak Garg
Org/Univ
National Institute of Technology, Kurukshetra, Haryana, India
Pub. Date
16 June, 2020
Paper ID
V6I3-1483
Publisher
Keywords
Cryptography, Data Security, Decryption, ESC (Encryption, Steganography, Compression)

Citationsacebook

IEEE
Shishupal Sidar, Gourav Chandel, Deepak Garg. Hybrid technique of data security by ECS (Encryption, Compression, Steganography), International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Shishupal Sidar, Gourav Chandel, Deepak Garg (2020). Hybrid technique of data security by ECS (Encryption, Compression, Steganography). International Journal of Advance Research, Ideas and Innovations in Technology, 6(3) www.IJARIIT.com.

MLA
Shishupal Sidar, Gourav Chandel, Deepak Garg. "Hybrid technique of data security by ECS (Encryption, Compression, Steganography)." International Journal of Advance Research, Ideas and Innovations in Technology 6.3 (2020). www.IJARIIT.com.

Abstract

The security of confidential data has long been a serious concern, and as a result, data security is in huge demand. Data is considered an important aspect of an asset and must be protected. Data Protection comprises data integrity, data authenticity, data confidentiality, and then some. Data is prone to possible security risks despite several measures for protecting data including steganography, encryption, and compression. The great reason is the disadvantages of these particular methods when certain factors are taken into account. Cryptography provides security, but it is expensive when time and space are considered. Compression methods encrypt data and save disk space, but attackers can easily decompress these compressed files. Steganography is a technique that hides data, does not encrypt it, and also has its advantages and disadvantages. This article details the approaches to data protection (compression, steganography, and compression) and their possible pros and cons. An extensive comparison between these techniques was generated and as a result, a hybrid approach called ECS (Encryption, Compression, and Steganography) was proposed. The proposed method utilizes particular approaches to overcome the limitations of existing techniques while also maintaining low complexity and minimal complexity and rich data security.