A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography

被引:11
|
作者
Varghese, Fredy [1 ,2 ]
Sasikala, P. [3 ]
机构
[1] Vinayaka Missions Kirupananda Variyar Engn Coll, Salem, Tamil Nadu, India
[2] Naipunnya Inst Management & Informat Technol, Dept Comp Sci, Trichur, Kerala, India
[3] Vinayaka Missions Kirupananda Variyar Engn Coll, Dept Math, Salem, Tamil Nadu, India
关键词
Security; Cryptography; Steganography; Advanced encryption standard (AES); Data hiding; DISCRETE WAVELET TRANSFORM; AUDIO STEGANOGRAPHY; IMAGE; ENCRYPTION; ALGORITHM;
D O I
10.1007/s11277-023-10183-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
During the last few decades, digital communication has played a vital role in various sectors such as healthcare departments, banking, information technology companies, industries, and other fields. Nowadays, all data are transmitted over the Internet, which needs high protection for transmitting the original data from source to destination. In order to secure digital communication, cryptography and steganography methods are used to achieve data security over insecure and open networks like the Internet. Cryptography is the method of encrypting secret information in an unreadable structure. Based on the cryptography method, the original message can be distorted before data transmission. On the other hand, steganography covers secret data such as audio, image, text, and video. It can hide the message while transmitting the original information from one end to another. The data combines images, texts, audio and videos, which are communicated worldwide through the Internet. This review paper gives an analysis based on the concept of cryptography and steganography. It also presents a comparative approach using several encryption algorithms with several factors such as block size, key size, encryption speed, memory usage, and security level.
引用
收藏
页码:2291 / 2318
页数:28
相关论文
共 50 条
  • [31] A Secure Text Communication Scheme Based on Combination of Compression, Cryptography, and Steganography
    Saneja, Kirti
    Kumar, Mukesh
    Sharma, Pallavi
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 205 - 214
  • [32] Secure Data Transfer in IoT environment: adopting both Cryptography and Steganography techniques
    Das, Ria
    Das, Indrajit
    2016 SECOND IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), 2016, : 296 - 301
  • [33] Secure Data Transmission on MANET by Hybrid Cryptography Technique
    Sharma, Ashish
    Bhuriya, Dinesh
    Singh, Upendra
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [34] Towards application of biometrically based methods for secure transmission of spatial data using elliptic curve cryptography
    Martin, Chris
    Vert, Gregory
    WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 2, 2005, : 325 - 329
  • [35] A Review on Biometric based Secure Data Transmission
    Kumbhare, Mithun G.
    Padole, Palash S.
    Shende, Diksha P.
    Meshram, Sanchana S.
    Baraskar, Shailesh S.
    Raut, Swati B.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 444 - 448
  • [36] A Smart Strategy for Data Hiding using Cryptography and Steganography
    Srinivasarao, Tumma
    Yannam, Adilakshmi
    Markapudi, Baburao
    Chaduvula, Kavitha
    Allada, Apparna
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2023, 82 (05): : 546 - 551
  • [37] Data hiding on web using combination of Steganography and Cryptography
    Kothari, Lipi
    Thakkar, Rikin
    Khara, Satvik
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 448 - 452
  • [38] Secure Data Transmission Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Harbi, Yasmine
    Aliouat, Zibouda
    Harous, Saad
    Bentaleb, Abdelhak
    MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, 2019, 64 : 34 - 46
  • [39] Trust management based multidimensional secure cluster with RSA cryptography algorithm in WSN for secure data transmission
    Anitha S.
    Saravanan S.
    Chandrasekar A.
    Measurement: Sensors, 2023, 29
  • [40] The New Method of Secure Data Transmission on the Indirect Steganography Basis
    Bekirov, Ali
    Barannik, Dmitry
    Frolov, Oleg
    Suprun, Oleh
    PROCEEDINGS OF 2016 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS), 2016,