Information technology is facing lots of problems, while transmitting sensitive data and confidential data due to rapid growth of technology. The sensitive data is intended to share between only authorized persons, not for all. Information security concentrates on sensitive knowledge pattern that can be exposed when extracting the data. Therefore, researchers, for a long time period, have been investigating paths to improve privacy for sensitive data in information security analysis task process. So, many techniques have been introduced on privacy preserving issues in information security by using cryptography, steganography and their combination. In this paper we proposed an effective and efficient approach based on cryptography and Chains Matrix Multiplication (CMM) steganography uses optimal substructure property for generating random key to hide the data. It has to be improved privacy of sensitive data in information security analysis. © 2012 Springer-Verlag GmbH.
CITATION STYLE
Rupa, C., & Avadhani, P. S. (2012). Information security using chains matrix multiplication. In Advances in Intelligent and Soft Computing (Vol. 167 AISC, pp. 703–712). https://doi.org/10.1007/978-3-642-30111-7_67
Mendeley helps you to discover research relevant for your work.