A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography

被引:11
|
作者
Varghese, Fredy [1 ,2 ]
Sasikala, P. [3 ]
机构
[1] Vinayaka Missions Kirupananda Variyar Engn Coll, Salem, Tamil Nadu, India
[2] Naipunnya Inst Management & Informat Technol, Dept Comp Sci, Trichur, Kerala, India
[3] Vinayaka Missions Kirupananda Variyar Engn Coll, Dept Math, Salem, Tamil Nadu, India
关键词
Security; Cryptography; Steganography; Advanced encryption standard (AES); Data hiding; DISCRETE WAVELET TRANSFORM; AUDIO STEGANOGRAPHY; IMAGE; ENCRYPTION; ALGORITHM;
D O I
10.1007/s11277-023-10183-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
During the last few decades, digital communication has played a vital role in various sectors such as healthcare departments, banking, information technology companies, industries, and other fields. Nowadays, all data are transmitted over the Internet, which needs high protection for transmitting the original data from source to destination. In order to secure digital communication, cryptography and steganography methods are used to achieve data security over insecure and open networks like the Internet. Cryptography is the method of encrypting secret information in an unreadable structure. Based on the cryptography method, the original message can be distorted before data transmission. On the other hand, steganography covers secret data such as audio, image, text, and video. It can hide the message while transmitting the original information from one end to another. The data combines images, texts, audio and videos, which are communicated worldwide through the Internet. This review paper gives an analysis based on the concept of cryptography and steganography. It also presents a comparative approach using several encryption algorithms with several factors such as block size, key size, encryption speed, memory usage, and security level.
引用
收藏
页码:2291 / 2318
页数:28
相关论文
共 50 条
  • [41] Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography
    Zhang, Xin
    Chen, Kejiang
    Ding, Jinyang
    Yang, Yuqi
    Zhang, Weiming
    Yu, Nenghai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3148 - 3163
  • [42] Secure Data Transmission in Smart Cities Using DNA Cryptography with LZW Compression Algorithm
    Karthikeyan, S.
    Poongodi, T.
    OPTOELECTRONICS INSTRUMENTATION AND DATA PROCESSING, 2024, 60 (01) : 156 - 167
  • [43] A Novel Secure Communication Protocol Combining Steganography and Cryptography
    Song, Shouchao
    Zhang, Jie
    Liao, Xin
    Du, Jiao
    Wen, Qiaoyan
    CEIS 2011, 2011, 15
  • [44] Exceptional key based node validation for secure data transmission using asymmetric cryptography in wireless sensor networks
    Valluri, Bhanu Priyanka
    Sharma, Nitin
    Measurement: Sensors, 2024, 33
  • [45] Enhancing Data Security Using DES-based Cryptography and DCT-based Steganography
    Solichin, Achmad
    Ramadhan, Erwin Wahyu
    2017 3RD INTERNATIONAL CONFERENCE ON SCIENCE IN INFORMATION TECHNOLOGY (ICSITECH), 2017, : 618 - 621
  • [46] A novel secure cryptography model for data transmission based on Rotor64 technique
    Obeidat, Ibrahim
    Mughaid, Ala
    AlZu'bi, Shadi
    AL-Arjan, Ahmed
    AL-Amrat, Rula
    AL-Ajmi, Rathaa
    AL-Hayajneh, Razan
    Abuhaija, Belal
    Abualigah, Laith
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (13) : 37295 - 37314
  • [47] A novel secure cryptography model for data transmission based on Rotor64 technique
    Ibrahim Obeidat
    Ala Mughaid
    Shadi AlZu’bi
    Ahmed AL-Arjan
    Rula AL-Amrat
    Rathaa AL-Ajmi
    Razan AL-Hayajneh
    Belal Abuhaija
    Laith Abualigah
    Multimedia Tools and Applications, 2024, 83 : 37295 - 37314
  • [48] Secured Transmission of Sensitive Images of Skin Diseases Using Steganography and Cryptography
    Hossain, Kunal
    Jana, Susovan
    Mukherjee, Saswati
    Parekh, Ranjan
    2017 IEEE CALCUTTA CONFERENCE (CALCON), 2017, : 95 - 99
  • [49] An Improved Lsb Data Steganography Using Elliptic Cuve Cryptography
    Ravivarma, G.
    Gavaskar, K.
    Kavitha, N. S.
    Banu, K. Shahanas
    Asha, K. G.
    Aarthi, S.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (06): : 06 - 11
  • [50] Secure transmission of medical records using high capacity steganography
    Srinivasan, Y
    Nutter, B
    Mitra, S
    Phillips, B
    Ferris, D
    17TH IEEE SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, PROCEEDINGS, 2004, : 122 - 127