Stegocrypto -A Review Of Steganography Techniques Using Cryptography (original) (raw)
Related papers
CRYPTOGRAPHY, ENCRYPTION/DECRYPTION AND STEGANOGRAPHY
Keyvan Derakhshan Nik ABSTRACT Nowadays, one of the fascinating sciences is information security around the world which covers vast variety of knowledge. It includes special knowledge about data protection. Cryptography and Encryption have been used for several centuries to protect data from hackers. From past few years, in lots of efforts scientists have been allocated to encrypted information in different ways 1. One of the methods which can be used in different approaches is Steganography. In the following, this paper will give some brief Introduction of Cryptography, Encryption/Decryption and Steganography with their usage Then It will continue with some statistics for knowledge of people and their idea about this concept as a case study. This paper will end up with a summary to obtain the importance of the Steganography for future science. Keywords: Cryptography, Encryption/Decryption , Steganography , Sound file , Image file, Text file.
A Comparative Study on Cryptography and Steganography
International Journal of Innovative Research in Science, Engineering and Technology, 2014
The data like username, password, and others will be hacked by the hackers and they can abuse the same. This issue can be comprehended typically by utilizing encryption and decryption algorithms. Encryption is a procedure of changing over clear secret data into indiscernible structure (Cipher Text). Decryption is a methodology of changing over the mixed up cipher text into decipherable structure. Both sender of the data and the beneficiary of the data utilizes same key for encrypting and decrypting. Yet the encryption and decryption algorithms have not given 100% security. The reason is that the hackers effortlessly will discover the key by catching the packets and breaking down the jaunty text utilizing different software and fittings. So we need an alternate way like steganography for hiding sensitive information. Even though both cryptography and steganography has its own advantages and disadvantages, we can combine both the techniques together. This paper presents a comparative study of both cryptography and steganography.
Study on Cryptography, Steganography and Combination of both for Data Security
International Journal of Research and Innovation in Applied Science, 2023
Secure data communication is a key factor today while communicating through the unreliable network. Nowadays almost all applications are internet-based and it is important that communication made confidential and secure. But network of so many people is always unreliable. Cryptography and steganography are two important techniques which is used for secret and reliable communication over the network. Cryptography is the process of protecting information using different cryptographic algorithms so that only the intended person can read and process it. Steganography is the process of protecting information by hiding it inside another file such as image, audio, video and so on. But in recent years cryptanalysis study becomes so strong that only cryptography or only steganography alone may not enough for securing data. So the combination of cryptography and steganography produce stronger method than previous. In recent years many works has done or proposed about combining different types...
Cryptography - An Advance Technology for Security
Data which is readable and understood with no special measures is called plain text or clear text. The plain text is the message or data or any information in its original form which can be made available to any person in readable form. To keep any information or data confidential, it is to be disguised from plain text to the form which is unreadable and gibberish to any person except the one who is intended to receive it. Such method of disguising the plain text is called encryption which ensures the information to be kept hidden from anyone for whom it is not intended. For instance, when Julius Caesar sent messages to his generals, he didn't trust his messengers. So he replaced every A in his messages with a D, every B with an E, and so on through the alphabets. Only someone who knew the "shift by 3" rule could decipher his messages. And so the idea of keeping the information hidden or the idea of encryption of data arose. With that, the data encrypted has to be brought back to its original form. Thus, the method to revert the encrypted data into its original form is decryption. These processes require some techniques to be applied in order to fulfill the aim of data hiding and its security. This is where cryptography shows its existence.
A Novel Two Layer of Security by Using Cryptography along with Steganography
2017
Security of data is an important task till from the beginning of internet to the current era. Currently main concern is over the transmitting of sensitive or high value data through open or nonsecure channel to the destination point in such a way that neither confidentiality nor the integrity of data has to be compromised. Conversion of actual information into some scrawled arrangement is termed as encryption. Although widely used cryptography techniques are still in use but alone it is not capable of protecting and hiding of data proficiently. Eavesdropper or detective can certainly identify the presence of scrambled information and can attempt a few cryptanalyses tactics to get the original information. So to enrich the safety of data a new approach is proposed that provides an easy to implementable and better security. The proposed work is about encrypting the plain text message by Rivest Cipher 4 (RC4) algorithm and then hiding the message into an image through steganography. En...
Securing Information : Cryptography and Steganography
2012
Today’s dynamic and information rich environment, information systems have become vital for any organization to survive. With the increase in the dependence of the organization on the information system, there exists an opportunity for the competitive organizations and disruptive forces to gain access to other organizations information system. This hostile environment makes information systems security issues critical to an organization. Current information security literature either focuses on anecdotal information by describing the information security attacks taking place in the world or it comprises of the technical literature describing the types of security threats and the possible security systems. Two of the best ways to provide security is Cryptography and Steganography. Cryptography and Steganography are cousins in the spy craft family. Cryptography scrambles a message so it cannot be understood and generates cipher text. Steganography word is derived from Greek, literally...
A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages
Engineering, Technology & Applied Science Research
Steganography and cryptography are very important techniques used in data security to hide and secure secret messages in transmitted data. This paper will introduce, implement and test a novel methodology which can be used as a secure and highly efficient method of data hiding and data extracting. Some efficiency parameters will be experimentally obtained and compared with other existing methods parameters to prove the efficiency of the proposed methodology.
Steganography a New Dawn in the World of Information Security Compared with Cryptography Technology
Throughout thousand ages the need for secure communication and private conversation has led to the invention of Cryptography. The word Cryptography is combination of the Greek words (kryptó), which means "hidden"; and (graphein), which means "writing", it is the act of having secure communication in the presence of third party called adversary. On the other hand Steganography is to conceal a secret message or image within another message and to extract this secret message only at its destination, the word steganography combines the Greek words (steganos), which means "concealed", and (graphein) which means "writing". While cryptography is the protection of a message contents alone, steganography is concerned with concealing the contents of a secret message, so steganography improves cryptography by hiding an encrypted message so that no one will suspect its existence. The main goal of steganography is to communicate securely in a completely undetectable manner and to avoid drawing suspicion to the transmission of a hidden data. It is not to keep others from knowing the hidden information, but it is to keep others from thinking that the information even exists. Thousands of years ago cryptography began by the application of codes and ciphers to protect secret messages, by the beginning of 20th century the invention of complex machines, such as the Enigma rotor machine, have provided more sophisticated ways of encryption; and subsequently introduction of computer systems has increased the efficiency and complexity of encryption. Nowadays modern digital Steganography became more sophisticated than the cryptography, allowing a user to hide large amounts of information within image or audio files. These forms of steganography are often used in conjunction with cryptography so that the information is doubly protected; first it is encrypted and then hidden so an adversary has to find the information first and then decrypt it. Researches are still underway to develop this technology and use it to protect the information in all fields. This paper is a trial to know and understand the Steganography as a technology and to make a comparison between cryptography and steganography.
A Survey on Cryptography and Steganography Methods for Information Security
2011
This paper deals with the tidings of cryptography in history, how it has played a vital role in World War-1, World War-2. It also deals with the Substitution, Transposition Cryptographic techniques and Steganography principles which can be used to maintain the confidentiality of computerized and none computerized information files. A number of well known techniques have been adapted for computer usage including the Ceaser cipher, Mono alphabetic cipher, Homophonic substitution, Bale cipher, Play fair cipher, Poly alphabetic cipher, Vigenere Cipher, One- time pad cipher, Vernam ciphers, Play Color Cipher and usage of rotor machine in Substitutions, Rail fence technique, more complex permutations for more secure transposition and some Steganography principle were briefly discussed with merits and demerits. Finally it gives the broad knowledge on almost all the cryptographic and Steganography principles where a reader or scholar have lot of scope for updating or invention of more secur...
Steganography Techniques Using Cryptography-A Review Paper
— The two important aspects of security that deal with transmitting information or data over some medium like internet are cryptography and steganography. Cryptography results in converting plain text into cipher text which is in unreadable or in non-explanatory form, difficult to be guessed by eavesdropper, Steganography on the other hand hides the secret data into carrier medium in such a way that its detection is prevented. Steganography is not a replacement of cryptography but can supplement it to produce good results. It is observed that steganography and cryptography alone is not sufficient for information security, so we can make more secure and robust approach by combining the best of both techniques. This paper describes the various steganography techniques combined with cryptography.