Techniques of Steganography and Cryptography in Digital Transformation

Techniques of Steganography and Cryptography in Digital Transformation

Sabyasachi Pramanik, Ramkrishna Ghosh, Digvijay Pandey, Debabrata Samanta, Soumi Dutta, Shawni Dutta
DOI: 10.4018/978-1-7998-8587-0.ch002
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Digital enterprise transformation is the amalgamation of digital techniques into the scopes of a business enterprise, fundamentally altering how one can employ and furnish ethics to clients. An organization can be authorized to take digital transformation due to several reasons. But the most important reason is that it is the survival issuance for many people. Digital transformation considers dissimilarity in every organization. Generally, it is the amalgamation of digital technology into all quarters of business. That consolidation brings about major alterations in how the business functions and conveys usefulness to its clients. Here, steganography and cryptography are used to facilitate digital transformation in any business.
Chapter Preview
Top

Introduction

Digital Enterprise Transformation is the amalgamation of digital techniques into the scopes of a business enterprise, fundamentally altering how one can employ and furnish ethics to clients. An organization can be authorized to take Digital Transformation due to several reasons. But the most important reason is that it is the survival issuance for many people. Generally, digital transformation is the amalgamation of digital technology incorporating various quarters of merchandising. That consolidation brings about major alterations in how the business functions and conveys usefulness to its clients. Steganography and cryptography plays a vital issue in the security of a digital enterprise. The developing utilization of Internet among public masses and accessibility of public and private computerized information and its sharing has driven industry experts and analysts to give a specific consideration to data security. Web clients oftentimes need to store, send, or get private data and this private data should be secured against unapproved access and assaults. By and by, three principle techniques for data security being utilized: watermarking, cryptography and steganography. In watermarking, information is covered up to pass on some data about the spread medium, for example, proprietorship and copyright.

Cryptography methods depend on delivering the substance of a message distorted to unapproved individuals. Steganography procedures depend on concealing the presence of data by inserting the mystery message in another spread medium. While every one of the three is data security methods cryptography and steganography are having wide application as watermarking is restricted to having data especially about the spread medium. With the development of PC organization, security of information has become a significant concern and in this way information concealing method has pulled in individuals around the world. Steganography methods are utilized to address advanced copyrights the board, secure data, and disguise mysteries. This article combines technique of steganography and cryptography to secure a digital enterprise. Nowadays, every organizations look to digital enterprise to reshape and transform their business. CIOs (Chief Information Officer) understand that data and information technology is really an important issue to their organizations. The convergence of cloud is the first important step to make opportunities and to be in competition. Here, the authors use the concept of steganography (Pramanik et al. 2020) and cryptography to shift information from any node to other in an organization. Information reliability plays a vital role; the confidential data should not be interpreted by a third party. So, data security characterizes major criteria in the sphere of digital enterprise transformation. Concepts of steganalysis and cryptanalysis are introduced here and along with some steganalysis tools can interpret the presence of any secret data within a cover medium.

With the help of these tools the CIOs can interpret whether any confidential data is leaked from the organization or not. So, along with the concept of cloud and machine learning algorithms steganography and cryptography enacts a significant role regarding strategies of a change in digital enterprise. Steganography is an art of hiding secret data within any medium like text, image, audio or video. Thus, during a message transfer from the sender to the receiver there is little scope for the unauthorized users to intercept. Since the ascent of the web, the security of data has additionally been one of the most testing components of data innovation and correspondence. Enormous volume of information is moved each second in the web through messages, document sharing destinations, and long range interpersonal communication locales and so on. As the quantity of web clients rises, the worry on the believability of the administrations is additionally on rise, so the idea of web security has become the significant exploration point these days.

Complete Chapter List

Search this Book:
Reset