Abstract: Securing data encryption and decryption using Cryptography and Steganography techniques with AI based system. Due to recent developments in stego analysis, providing security to personal contents, messages, or digital images using steganography has become difficult. By using stego analysis, one can easily reveal existence of hidden information in carrier files. This invention introduces a novel steganographic approach for communication between two private parties. The approach introduced in this innovation makes use of both steganographic as well as cryptographic techniques. In Cryptography we are using AI based RSA. In Steganography we are using Image Steganography for hiding the data. And we also use Mutual Authentication process to satisfy all services in Cryptography i.e., Access Control, Confidentiality, Integrity, Authentication. In this way we can maintain the data more securely. Since we use AI-based RSA algorithm for securing the data and again on this we perform Steganography to hide the data in an image. Such that any other person in the network cannot access the data present in the network. Only the sender and receiver can retrieve the message from the data.
Description:In the invention, Digital communication witnesses a noticeable and continuous development in many applications in the Internet. Hence, secure communication sessions must be provided. The security of data transmitted across a global network has turned into a key factor on the network performance measures. So, the confidentiality and the integrity of data are needed to prevent eavesdroppers from accessing and using transmitted data. Steganography and Cryptography are two important techniques that are used to provide network security.
Cryptography is one of the traditional methods used to guarantee the privacy of communication between parties. This method is the art of secret writing, which is used to encrypt the plaintext with a key into ciphertext to be transferred between parties on an insecure channel. Using a valid key, the ciphertext can be decrypted to the original plaintext. Without the knowledge of the key, nobody can retrieve the plaintext. Cryptography plays an essential role in many factors required for secure communication across an insecure channel, like confidentiality, privacy, non- repudiation, key exchange, and authentication. , C , C , Claims:1. A method for detect of anomalies in health record, the method comprising:
Securing data encryption and decryption using Cryptography and Steganography techniques with AI based system . Due to recent developments in stego analysis, providing security to personal contents, messages, or digital images using steganography has become difficult. By using stego analysis, one can easily reveal existence of hidden information in carrier files. This invention introduces a novel steganographic approach for communication between two private parties. The approach introduced in this innovation makes use of both steganographic as well as cryptographic techniques. In Cryptography we are using AI based RSA. In Steganography we are using Image Steganography for hiding the data. And we also use Mutual Authentication process to satisfy all services in Cryptography i.e., Access Control, Confidentiality, Integrity, Authentication. In this way we can maintain the data more securely. Since we use AI-based RSA algorithm for securing the data and again on this we perform Steganography to hide the data in an image. Such that any other person in the network cannot access the data present in the network. Only the sender and receiver can retrieve the message from the data.
2. An method according to claim 1,Capability of system implement AI based RSA model for secure data transmission .
3. An system according to claim 2,Capability of system to development of stego analysis
4. An system according to claim 1,Capability of system to detect anomalies data transmission.
| # | Name | Date |
|---|---|---|
| 1 | 202241031736-COMPLETE SPECIFICATION [02-06-2022(online)].pdf | 2022-06-02 |
| 1 | 202241031736-FORM-9 [02-06-2022(online)].pdf | 2022-06-02 |
| 2 | 202241031736-DRAWINGS [02-06-2022(online)].pdf | 2022-06-02 |
| 2 | 202241031736-FORM 1 [02-06-2022(online)].pdf | 2022-06-02 |
| 3 | 202241031736-FIGURE OF ABSTRACT [02-06-2022(online)].jpg | 2022-06-02 |
| 4 | 202241031736-DRAWINGS [02-06-2022(online)].pdf | 2022-06-02 |
| 4 | 202241031736-FORM 1 [02-06-2022(online)].pdf | 2022-06-02 |
| 5 | 202241031736-COMPLETE SPECIFICATION [02-06-2022(online)].pdf | 2022-06-02 |
| 5 | 202241031736-FORM-9 [02-06-2022(online)].pdf | 2022-06-02 |