Abstract
The Advanced Encryption Standard better known as the AES algorithm is a symmetric (uses the same key to encrypt and decrypt) cryptographic technique used in most of today’s classified and unclassified data transfers. The AES algorithm provides data transfers with layers of security through its mathematical complexity. Alongside this technique of encryption, the act of concealing data within different objects is now becoming an essential component in the art of secure data transfer. This method of hiding secret messages within a file type is known as Steganography. Even though these two elements of secure data transfer differ, they both share the same objective namely to protect the integrity of the data. This paper provides an explanation of Steganography and AES algorithm and how they can be used together to enhance the security of data. The experiments that this paper demonstrates used the AES-256 algorithm.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Daemen, J., Rijmen, V. (1999). AES proposal: Rijndael, AES algorithm submission. September 3. http://www.nist.gov/CryptoToolkit.
Bogdanov, A., Khovratovich, D., & Rechberger, C. (2011). Biclique cryptanalysis of the full AES, Lecture notes in computer science (Vol. 7073, pp. 344–371). Berlin/New York: Springer.
Paar, C., & Pelzl, J. (2010). Understanding cryptography. Berlin: Springer.
Channalli, S., & Jadhav, A. (2009). Steganography an art of hiding data. International Journal on Computer Science and Engineering, 1(3), 137–141.
Buchmann, J. (2001). “5 DES”, Introduction to cryptography (pp. 119–120). New York: Springer.
Canright, D. (2005). A very compact S-Box for AES, Lecture notes in computer science (Vol. 3659, pp. 441–455). Berlin/New York: Springer.
Gowtham, M., et al. (2013). AES based steganography. IJAIEM, 2(1), 382–389.
Ramaiya, M., et al. (2013). Secured steganography approach using AES. IJCSEITR, 3(3), 185–192.
Kumthe, A., et al. (2016). Steganography based on AES algorithm and BPCS technique for a securing image. IJARCSSE, 6(3), 116–119.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Gardner, J. (2018). Techniques for Secure Data Transfer. In: Latifi, S. (eds) Information Technology - New Generations. Advances in Intelligent Systems and Computing, vol 558. Springer, Cham. https://doi.org/10.1007/978-3-319-54978-1_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-54978-1_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-54977-4
Online ISBN: 978-3-319-54978-1
eBook Packages: EngineeringEngineering (R0)