nanoll extt
Please use this identifier to cite or link to this item: http://lrcdrs.bennett.edu.in:80/handle/123456789/4042
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAnika
dc.contributor.authorShukla, Animesh
dc.contributor.authorYadav, Kuber
dc.contributor.authorJha, Sankalp
dc.date.accessioned2024-05-30T10:11:56Z-
dc.date.available2024-05-30T10:11:56Z-
dc.date.issued2023
dc.identifier.issn978-93-5053-906-4
dc.identifier.urihttp://lrcdrs.bennett.edu.in:80/handle/123456789/4042-
dc.description.abstractAiming to tackle various aspects of secure data handling, the robust yet beginner-friendly project File Crypt comprises three key components. Each component serves a unique purpose and seamlessly works together to ensure comprehensive protection for digital information. This report probes into each component's functionality, underscores the integration of the project, emphasizes its user-friendly interface and security measures while highlighting its role as an advanced solution for managing data securely and efficiently. FileCrypt's first component: a steganography tool; equips users with the ability to hide sensitive information within apparently harmless files. By embedding data in plain view-a technique that adds an additional layer of security, it becomes less vulnerable to unapproved access. Designed for ease-of- use and accessibility the tool caters even to novices, enabling them not only to navigate through its features effortlessly but also exploit them effectively._x000D_ Utilizing Huffman-encoding based compression and decompression, the third component of File Crypt optimizes storage of encrypted data: it reduces file sizes without compromising security. This feature-with its efficient tools for compression and decompression-enhances overall project performance, this allows faster transfer and storage of data. FileCrypt distinguishes itself through its holistic approach it seamlessly integrates three crucial components privacy, encryption, and access control-to offer a comprehensive solution for secure data management. Moreover, the user-friendly interface fosters ease in tool navigation even among individuals possessing limited technical knowledge; therefore, beginners seeking to bolster their data security practices can find an ideal choice here.en_US
dc.publisherCYBER TECH PUBLICATIONSen_US
dc.titleFile Lock: Data Encryption Toolen_US
dc.typeBook Chapteren_US
Appears in Collections:Book Chapters_ SCSET

Files in This Item:
File SizeFormat 
Ch_13_978-93-5053-906-4.pdf
  Restricted Access
1.97 MBAdobe PDFView/Open Request a copy

Contact admin for Full-Text

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.