A Review of Combined Effect of Cryptography & Steganography Techniques to Secure the Information

被引:1
|
作者
Mustafa, Ghulam [1 ]
Ashraf, Rehan [1 ]
Ul Haq, Inam [2 ]
Khalid, Yusra [1 ]
Ul Islam, Rafiq [3 ]
机构
[1] Natl Text Univ, Dept Comp Sci, Faisalabad, Pakistan
[2] Univ Okara, Dept Comp Sci, Okara, Pakistan
[3] Beijing Inst Technol, Dept Comp Sci, Beijing, Peoples R China
关键词
Security; Cryptography; Steganography; Ciphers; Encryption; Decryption;
D O I
10.1109/icced46541.2019.9161128
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the age of technology, the internet is the major component that is used to connect the whole world. The information or data that we share on the internet is not secure at all due to hackers and intruders. The prime attack on this information is a loss of confidential information or modification of this information that is called confidentiality and Integrity. Cryptography is used for secure communication over the internet in the presence of the intruder or hacker. Cryptography is a technique in which plain text converted into ciphertext in such a way that only particular receiver can understand it. In cryptography, the existence of ciphertext is known to the intruder or hacker. Whereas steganography is a technique in which message embedded into the cover image such that no one knows the existence of message except the sender and receiver. This paper provides a review of the combined effect of cryptography and steganography techniques to secure the information shared over the internet. The comparison of the combined cryptography and steganography techniques evaluated on the basis of some selected parameters like their encryption technique, key length, security, and data is hidden capacity.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Review On Cryptography and Steganography Techniques in Video
    Aiswarya, S.
    Gomathi, R.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC 2018), 2018, : 30 - 33
  • [2] Review on lightweight cryptography techniques and steganography techniques for IoT environment
    Supriya, K. Sangeetha
    Lovesum, S. P. Jeno
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (09) : 4210 - 4228
  • [3] Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-Based Cryptography, and Chaotic Cryptography Techniques
    Pekerti, Albertus Anugerah
    Sasongko, Arif
    Indrayanto, Adi
    [J]. IEEE ACCESS, 2024, 12 : 75146 - 75168
  • [4] A Review of Steganography Techniques for Digital Information Transmission for Secure Channels with Digital Images
    Caballero-Hernandez, Hector
    Munoz-Jimenez, Vianney
    Ramos, M.
    Morales-Reyes, A.
    Romero-Huertas, Marcelo
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2019, 17 (11) : 1831 - 1842
  • [5] Secure Data Transfer in IoT environment: adopting both Cryptography and Steganography techniques
    Das, Ria
    Das, Indrajit
    [J]. 2016 SECOND IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), 2016, : 296 - 301
  • [6] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Varghese, Fredy
    Sasikala, P.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (04) : 2291 - 2318
  • [7] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Fredy Varghese
    P. Sasikala
    [J]. Wireless Personal Communications, 2023, 129 : 2291 - 2318
  • [8] A Secure Data Hiding Scheme Based on Combined Steganography and Visual Cryptography Methods
    Nandakumar, Aishwarya
    Harmya, P.
    Jagadeesh, Noopa
    Anju, S. S.
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 498 - 505
  • [9] A Review on Steganography and Cryptography
    Mishra, Rina
    Bhanodiya, Praveen
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 119 - 122
  • [10] Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
    Naser, Mohammed Abdullah
    Al-alak, Saif M. Kh.
    Hussein, Ahmed Mohammed
    Jawad, Majid Jabbar
    [J]. BAGHDAD SCIENCE JOURNAL, 2022, 19 (06) : 1362 - 1368