Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
5 pages
1 file
Security and privacy for a data transmission become a major concern due to rise of internet usage. Many developers are working continuously to make an internet safe environment, but the intruders are very smart to hack the information. For that, two entities communicating need to communicate in a way which is not susceptible to listen in or interception. So every organization uses many data encryption techniques to secure their communication. There are two security mechanisms called, Cryptography and Steganography are being applied. By merging these techniques, two level of information security is achieved. This paper discuss about the way of working Cryptography and Steganography and their different approaches.
International Journal of Research and Innovation in Applied Science, 2023
Secure data communication is a key factor today while communicating through the unreliable network. Nowadays almost all applications are internet-based and it is important that communication made confidential and secure. But network of so many people is always unreliable. Cryptography and steganography are two important techniques which is used for secret and reliable communication over the network. Cryptography is the process of protecting information using different cryptographic algorithms so that only the intended person can read and process it. Steganography is the process of protecting information by hiding it inside another file such as image, audio, video and so on. But in recent years cryptanalysis study becomes so strong that only cryptography or only steganography alone may not enough for securing data. So the combination of cryptography and steganography produce stronger method than previous. In recent years many works has done or proposed about combining different types...
International Journal of Innovative Research in Science, Engineering and Technology, 2014
The data like username, password, and others will be hacked by the hackers and they can abuse the same. This issue can be comprehended typically by utilizing encryption and decryption algorithms. Encryption is a procedure of changing over clear secret data into indiscernible structure (Cipher Text). Decryption is a methodology of changing over the mixed up cipher text into decipherable structure. Both sender of the data and the beneficiary of the data utilizes same key for encrypting and decrypting. Yet the encryption and decryption algorithms have not given 100% security. The reason is that the hackers effortlessly will discover the key by catching the packets and breaking down the jaunty text utilizing different software and fittings. So we need an alternate way like steganography for hiding sensitive information. Even though both cryptography and steganography has its own advantages and disadvantages, we can combine both the techniques together. This paper presents a comparative study of both cryptography and steganography.
International Journal on Data Science and Technology, 2017
Internet communication become the need of entire world, today internet is like a recourse of power that is used to run human life. The users, as a layman, may not know that internet, a way of communication, as the use of internet is increasing also data and information that is traveling through internet is increasing by every passing day every minute. In an internet environment where every user need security about their data and information that they want to share with other, such environment requires secrecy and security to safeguard the privacy. There are many approaches available that can be adopted to provide user data security, Steganography is one of the techniques which offer sufficient platform to tackle this aspect in a suitable way. The working is very easy; the information (data) can be hidden inside the other information (data) while viewers may see the cover and hidden data will be known to intended viewers only that know the way of decryption that is adopted at sender side. In simple world two images are selected, one as cover and other as message carrier, but the view and size of original image may not be changed. This paper discusses certain technique and algorithms in context to Least Significant Bit (LSB) and ascertains possible depth of LSB usage where the distortion of image starts and attracts the attacker/ hacker. It became a unique way of information hiding by merging images with cipher data or plain text.
2013 International Conference on Electronics, Computer and Computation (ICECCO), 2013
Information security is the process of protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. Nowadays, apart from the military and institutional information security, individual information security is very important. If individual information security is ignored, it can cause intangible damage and monetary loss. In this study, a steganography application was developed to increase personal information security. This application is intended to provide a more secure way of communication for emails which play an important role in personal data transfer. Thus, Steganography, which is one of the communication hiding techniques, is used. And also existing steganography methods are examined and a new application has been developed to be used for personal information security. Finally, this application was applied to an electronic mail communication.
The need for security in data communication is as long as mankind; since eavesdroppers often intercept such communication for malicious purposes. Several techniques such as steganography and cryptography have been employed to hide the existence of communication and scramble such communication making it difficult to interpret in cases where steganography fails. Combining Cryptography and steganography has proven to have taken data communication security to another level. In this work, a review of these techniques is presented with major focus on two journals titled " Dual Layer Security of Data Using LSB Image Steganography Method and AES Encryption Algorithm " [1] and " An Efficient Data Hiding Scheme Using Steganography and Cryptography Technique " [2]were considered for review. A brief description of the techniques is provided. It is found that these techniques could improve security of data communication beyond the present levels if properly combined with little or no performance degradation.
International Journal of Emerging Research in Management and Technology, 2017
oday the exponential growth in internet users demand secure data communication, for that it is required to send the data in the form of encrypted or hidden form. Many information system security techniques are available. They are classified into three classes as cryptography, steganography and watermarking. This paper presents a review on steganography techniques and their uses and attacks on these. The steganography is commonly known as covert writing and mainly used in hidden communication. A reliable internet communication is free from the attacks on it.
Advances in Multidisciplinary and scientific Research Journal Publication
Transportation of information across the internet necessitates security concerns. Internally, transmission of data in organisation must also be secured, according to security standards. In a typical distribution, all traffic transferred via the public network (Internet) is secured. However, sensitive information must not be easily accessible in the event that an attacker compromises any services on the hosts and gains access to their resources. The advancement of information technology has enabled large amounts of digital data to be reliably transported through unrestrained communication channels. Today’s information world is a digital world. Data transmission over an unsecure channel is becoming a major issue of concern nowadays. And at the same time intruders are spreading over the internet and being very active. So to protect the secret data from theft, some security measures need to be taken. In order to keep the data secret various techniques have been implemented to encrypt an...
— The two important aspects of security that deal with transmitting information or data over some medium like internet are cryptography and steganography. Cryptography results in converting plain text into cipher text which is in unreadable or in non-explanatory form, difficult to be guessed by eavesdropper, Steganography on the other hand hides the secret data into carrier medium in such a way that its detection is prevented. Steganography is not a replacement of cryptography but can supplement it to produce good results. It is observed that steganography and cryptography alone is not sufficient for information security, so we can make more secure and robust approach by combining the best of both techniques. This paper describes the various steganography techniques combined with cryptography.
International Journal of Mathematical Sciences and Computing
Data privacy is being breached occasionally whether in storage or in transmission. This is due to the spate of attack occasioned by the movement of data and information on an insecure internet. This study aimed to design a system that would be used by both sender and receiver of a secret message. The system used the combination of Steganography (MSB) and Cryptography (RSA) approaches to ensure data privacy protection. The system generates two keys: public and private keys, for the sender and receiver to encrypt and decrypt the message respectively. The steganography method used does not affect the size of cover image. The software was designed using python programming language in PyCharmIDE. The designed system enhanced the security and privacy of data. The results of this study reveal the effectiveness of combination of steganography and cryptography over the use of either cryptography or steganography and other existing systems.
The International Journal of Science & Technoledge, 2020
Communication of data and the desire to maintain confidentiality, integrity and privacy of information to avoid copyright violation and its likes gave way to the need for data security and protection. The growing possibilities of modern communications need a special means of security especially on computer network. The network security has become more important as the number of data being exchanged via the Internet increases. Therefore, confidentiality and data integrity are required to protect against unauthorized access and use. This has resulted in an explosive growth of the field of information hiding. In addition, rapid growth of publishing and broadcasting technology also requires an alternative solution in hiding information. This is achieved through steganography or cryptography. The word 'Steganography' originated from Greek, meaning 'covered or hidden writing' (Shulmin and Krylova, 2017). Steganography is a security mechanism of hiding sensitive information among the bits of a cover file such as an image, text, an audio or a video file in such a way that only sender and receiver knows about the hidden message inside the cover file. Cryptography also comes from a Greek word meaning hidden or secret writing for secure Communication in the presence of an unauthorized person. Cryptography includes encryption and decryption process of a message. Cryptography allows data to be sent in disguise so that an intruder who taps the information make no meaning from it, (Kurose and Ross, 2013). Cryptography is the art of protecting sensitive information by encrypting it into an unreadable format called cipher text. The main aim in steganography is to hide the very existence of a message in a cover medium while the goal of cryptography is to make data unreadable by a third party. The cryptography and steganography are two widely techniques used for confidentiality of data exchange. Cryptography is used to cipher information and steganography is used to hide the existence of data communication. Cryptography scrambles the information by using a key so that a third person cannot access the information without the key. Steganography hides the information by using a cover medium so that a third person cannot identify the communication. Cryptography algorithms are divided into symmetric (secret-key) and asymmetric (public-key) network security protocols. Symmetric algorithms are used to encrypt and decrypt original messages (plaintext) by using the same key. While Asymmetric algorithms uses public-key cryptosystem to exchange key and then use faster secret key algorithms to ensure confidentiality of stream data. In Public-key encryption algorithms, there is a pair of keys, one key is known to the public, and is used to encrypt information to be sent to a receiver who owns the corresponding private key. The private and public keys are both different and need for key exchange.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
International Journal of Advanced Computer Science and Applications, 2016
Zenodo (CERN European Organization for Nuclear Research), 2022
International Conference …, 2008
International Journal of Cyber-Security and Digital Forensics, 2018
International Journal of Computer Applications
International journal of multidisciplinary and current research, 2015