hidden

  • Sold By: Brilliantng

    DATA AND DOCUMENTS HIDDEN USING SHA-2 ALGORITHMS AND STEGANOGRAPHY

    Sold By: Brilliantng

    ABSTRACT

    This research is on Data and documents hidden using sha-2 algorithms and steganography. Digital data communication has become an integral part of infrastructure this day. In this technological era, where there is an increasing importance of internet use and fast communication technologies. The security and confidentiality of sensitive data has become of prime concern to many in the society, which has led to the increase in methods through which data and documents can be safely handled and transmitted. Amongst many approaches to making sure that our documents/files remain safe, the use of SHA 2 hash logic Algorithm and Steganography as a combined means to securing data and documents. A digital signature can directly provide several security services including message authentication, message integrity, and non-repudiation, while steganography hides the existence of the message from unauthorized users, the benefits remain that if the document or data is hidden, the person who wants to access it should be able to prove that he/she has the right to do so and it’s not illegal. With the combination of this encryption methods, loss of information’s can be curtailed and also care on the side of the owner can be better encouraged.

    2,500.003,000.00 Add to cart

Main Menu