A novel approach using steganography and cryptography in business intelligence
- Title
- A novel approach using steganography and cryptography in business intelligence
- Creator
- Pramanik S.; Ghosh R.; Ghonge M.M.; Narayan V.; Sinha M.; Pandey D.; Samanta D.
- Description
- In the information technology community, communication is a vital issue. And image transfer creates a major role in the communication of data through various insecure channels. Security concerns may forestall the direct sharing of information and how these different gatherings cooperatively direct data mining without penetrating information security presents a challenge. Cryptography includes changing over a message text into an unintelligible figure and steganography inserts message into a spread media and shroud its reality. Both these plans are successfully actualized in images. To facilitate a safer transfer of image, many cryptosystems have been proposed for the image encryption scheme. This chapter proposes an innovative image encryption method that is quicker than the current researches. The secret key is encrypted using an asymmetric cryptographic algorithm and it is embedded in the ciphered image using the LSB technique. Statistical analysis of the proposed approach shows that the researcher's approach is faster and has optimal accuracy. 2021, IGI Global.
- Source
- Integration Challenges for Analytics, Business Intelligence, and Data Mining, pp. 192-217.
- Date
- 2020-01-01
- Publisher
- IGI Global
- Coverage
- Pramanik S., Haldia Institute of Technology, India; Ghosh R., Haldia Institute of Technology, India; Ghonge M.M., Sandip Institute of Technology and Research Centre, India; Narayan V., MMM Collage, Gorakhpur, India; Sinha M., CHRIST University (Deemed), India; Pandey D., Department of Technical Education, India, IET, India; Samanta D., CHRIST University (Deemed), India
- Rights
- Restricted Access
- Relation
- ISBN: 978-179985783-9; 1799857816; 978-179985781-5
- Format
- Online
- Language
- English
- Type
- Book chapter
Collection
Citation
Pramanik S.; Ghosh R.; Ghonge M.M.; Narayan V.; Sinha M.; Pandey D.; Samanta D., “A novel approach using steganography and cryptography in business intelligence,” CHRIST (Deemed To Be University) Institutional Repository, accessed February 23, 2025, https://archives.christuniversity.in/items/show/18800.