A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography

被引:11
|
作者
Varghese, Fredy [1 ,2 ]
Sasikala, P. [3 ]
机构
[1] Vinayaka Missions Kirupananda Variyar Engn Coll, Salem, Tamil Nadu, India
[2] Naipunnya Inst Management & Informat Technol, Dept Comp Sci, Trichur, Kerala, India
[3] Vinayaka Missions Kirupananda Variyar Engn Coll, Dept Math, Salem, Tamil Nadu, India
关键词
Security; Cryptography; Steganography; Advanced encryption standard (AES); Data hiding; DISCRETE WAVELET TRANSFORM; AUDIO STEGANOGRAPHY; IMAGE; ENCRYPTION; ALGORITHM;
D O I
10.1007/s11277-023-10183-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
During the last few decades, digital communication has played a vital role in various sectors such as healthcare departments, banking, information technology companies, industries, and other fields. Nowadays, all data are transmitted over the Internet, which needs high protection for transmitting the original data from source to destination. In order to secure digital communication, cryptography and steganography methods are used to achieve data security over insecure and open networks like the Internet. Cryptography is the method of encrypting secret information in an unreadable structure. Based on the cryptography method, the original message can be distorted before data transmission. On the other hand, steganography covers secret data such as audio, image, text, and video. It can hide the message while transmitting the original information from one end to another. The data combines images, texts, audio and videos, which are communicated worldwide through the Internet. This review paper gives an analysis based on the concept of cryptography and steganography. It also presents a comparative approach using several encryption algorithms with several factors such as block size, key size, encryption speed, memory usage, and security level.
引用
收藏
页码:2291 / 2318
页数:28
相关论文
共 50 条
  • [21] SECURE AND HIDDEN TEXT USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY
    Abood, May Hattim
    Taha, Zahraa Khudhair
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2019, 14 (03) : 1434 - 1450
  • [22] A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages
    Rasras, Rashad J.
    AlQadi, Ziad A.
    Abu Sara, Mutaz Rasmi
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2019, 9 (01) : 3681 - 3684
  • [23] Secure QR-Code Based Message Sharing System Using Cryptography and Steganography
    Mendhe, Abhijeet
    Gupta, Deepak Kumar
    Sharma, Krishna Pal
    2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 188 - 191
  • [24] A Review on Steganography and Cryptography
    Mishra, Rina
    Bhanodiya, Praveen
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 119 - 122
  • [25] Data Security Using Cryptography and Steganography Techniques
    Saleh, Marwa E.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 390 - 397
  • [26] Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-Based Cryptography, and Chaotic Cryptography Techniques
    Pekerti, Albertus Anugerah
    Sasongko, Arif
    Indrayanto, Adi
    IEEE ACCESS, 2024, 12 : 75146 - 75168
  • [27] Secure data transmission for multibiometric identity verification systems using steganography and encryption
    Killioglu, Mehmet
    Taskiran, Murat
    Kahraman, Nihan
    PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI, 2018, 24 (02): : 173 - 179
  • [28] Secure patients data transmission using XOR ciphering encryption and ECG steganography
    Patel, Shaheen S.
    Sankpal, S. V.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1311 - 1315
  • [29] Secure Medical Image Steganography with RSA Cryptography using Decision Tree
    Jain, Mamta
    Choudhary, Rishabh Charan
    Kumar, Anil
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 291 - 295
  • [30] A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure
    Namasudra, Suyel
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104