Online ISSN: 2515-8260

Keywords : Stenography

Quantum Cryptography helps to enhance on security issues

Mr.BGiridhar .

European Journal of Molecular & Clinical Medicine, 2021, Volume 8, Issue 4, Pages 130-139

Stegnography is the technique of hiding confidential information within
anymedia.Inrecentyearsvarious stegnography methods have been proposed to
makedatamoresecure.Atthesametimedifferentsteganalysismethods have also evolved. The
number of attacks used by thesteganalyst has only multiplied over the years. Various
toolsfor detecting hidden information’s are easily available over theinternet, so securing
data from steganalyst is still considered
amajorchallenge.Whilevariousworkhavebeendonetoimprove the existing algorithms and
also new algorithms havebeenproposedtomakedatabehindtheimagemoresecure.Wehave still
been using the same public key cryptography likeDeffie-
HellmanandRSAforkeynegotiationwhichisvulnerable to both technological progress of
yalongwithstegnography.Theuseof this combination will
createkeydistributionschemesthatareuninterceptable thusprovidingour dataaperfectsecurity.

Quantum cryptography helps to improve security problems

Mr.BGiridhar .

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 5760-5767

Integration is the method used to hide private information in any medium. In recent years,
several techniques of steganography have been suggested to protect data. Different
techniques of steganalysis have also developed. The number of assaults that the steganalyst
has employed has increased throughout the years. Different methods for detection of
concealed information are readily accessible over the Internet, thus it is still a significant
problem to secure data from Steganalyst. During several works to enhance the current
algorithms and also new algorithms, data underlying the picture have been suggested to be
safer. We still utilise the same public key cryptography like Deffie-Hellman and RSA for
key negotiations, which is susceptible both to the technical development of computer power
and to the advancement of mathematics. The adoption of this combination will produce
uninterceptable key distribution methods, giving our data with complete safety.