SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Exploring Emerging Trends in Engineering (IJEETE)
Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM
ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 1
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
1
Priyanka, 2
Lal Chand Panwar
Department of C.S.E, DBU University, Gobindgarh
Department of C.E UCOE, Punjabi University, Patiala
priyanka.kataria05@gmail.com, lcpanwar@yahoo.com
ABSTRACT
Security techniques such as: secrecy,
authentication, non-repudiation and integrity
control. Secrecy techniques are in two
categories: cryptography and steganography.
Steganography and cryptography is a very useful
technique to achieve secrecy in communication.
One hides the existence of the message as well as
the further distorts the message itself. By means
of cryptography, the data is transformed into
some other gibberish form and then the
encrypted data is transmitted. In steganography,
the data is embedded in an image file and the
image file is transmitted. This paper spotlights
on the potency of combining cryptography and
steganography methods to enhance the security
of communication over an open channel.
Keywords- Cryptography, Decryption,
Encryption, Steganography .
I. INTRODUCTION
Cryptography and Steganography are well
known and widely used techniques that
manipulate (change) information in order to
cipher or hide their existence respectively.
Steganography is the way of communication in
which hides the existence of the communication.
Cryptography scuttles a message so it cannot be
understood; the Steganography hides the
message so it cannot be seen. Even though both
methods offer security, a study is made to
combine both cryptography and Steganography
methods into one system for enhanced
confidentiality and security.
Cryptography systems that use a single
key is called symmetric key systems that both
the sender and the receiver have, and public-key
systems in which two keys are used, a public key
known to everyone and a abstract.
Fig 1. A Model Of Steganographic Process With
Cryptographic [1]
Classification of Cryptography and
Steganography:
Cryptography defines the sculpture and science of
transforming data into a sequence of bits that appears
as random and meaningless to a side observer or
attacker.
1. Transforming plain text to cipher text. The entire
encryption algorithms are based on two general
principles: substitution, in which each element in the
plaintext is mapped into an additional element, and
transposition, in which elements in the basic text are
rearranged. The elementary requirement is that no
information be lost.
2. Number of keys used. There are some standards
methods which are used with cryptography such as
furtive key, public key, digital signature as well as
hash function.
Secret Key (Symmetric): With secret key
cryptography, a single key is used for mutually
International Journal of Exploring Emerging Trends in Engineering (IJEETE)
Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM
ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 2
encryption and decryption. The dispatcher uses the
key to encrypt the basic text furthermore sends the
cipher text to the receiver. The receiver applies the
same key to decrypt the message and recover the
plaintext. Because a solo key is used for both
functions, secret key cryptography is moreover called
as symmetric encryption.
Public Key: Public key cryptography has been said to
be the most significant new development in
cryptography. Study described two-key crypto
system in which two parties could engage in a secure
communication over an insecure communications
channel without having to share a secret key.
Digital Signature: The use of digital signature came
from the need of ensuring the authentication. The
digital signature is further like stamp or signature of
the sender which is embedded together with the data
and encrypts it with the private key in order to send it
to the additional party. In addition, the signature
declares that any change made to the data that has
been signed is easy to detect by the receiver.
Hash Function: The hash function is a one technique
encryption, the hash function is a well-defined
process or mathematical formula that represents a
small size of bits which is generated from a bulky
sized file, the outcome of this function can be called
hash code otherwise hashes. The generating of hash
code is faster than supplementary methods which
make it more desired for authentication and integrity.
Cryptographic hash functions are to a great extent
used for digital signature and cheap constructions are
highly desirable.
3. for processing plain text.
A block cipher processes the input one block of
elements at a instance, producing an productivity
block for every input block. A stream cipher
processes the put in elements continuously,
producing output one element at a instance, as it goes
along. The proposed algorithm uses a changeover
cipher method. It is a symmetric key algorithm using
the technique of stream cipher.
STEGANOGRAPHY
The word steganography comes from the Greek
Steganos, which mean covered or secret and
graphy means writing or drawing. Therefore,
steganography [2] means, literally, covered
writing. The basic model of steganography
consists of Carrier, Message, Embedding
algorithm and Stego key. The model for
steganography is shown in Figure 2. Carrier is
also known as a cover-object, which embeds the
message and serves to hide its presence.
Since then, the steganography approaches can be
divided into three types [4]:
Fig 2. Model of Steganography
Pure Steganography: This technique simply uses
the steganography approach only without
combining other methods. It is working on
hiding information within cover carrier.
Secret Key Steganography: The secret key
steganography use the combination of the secret
key cryptography technique and the
steganography approach. The idea of this type is
to encrypt the secret message or data by secret
key approach and to hide the encrypted data
within cover carrier.
Public Key Steganography: The last type of
steganography is to combine the public key
cryptography approach and the [6]
steganography approach. The idea of this type is
to encrypt the secret data using the public key
approach and then hide the encrypted data within
cover carrier.
International Journal of Exploring Emerging Trends in Engineering (IJEETE)
Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM
ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 3
II. PROPOSED APPROACH
Basically, the purpose of cryptography
and steganography is to provide secret
communication. Steganography [5] is:” Hiding a
secret message within a larger one in such a way
that others cannot discern the presence or
contents of the hidden message” and
Cryptography is “The process or skill of
communicating in, or deciphering secret writing
or ciphers.” Steganography can be used to cloak
hidden messages in image, audio and even text
files. Now, it is gaining new popularity with the
current industry demands for digital
watermarking and fingerprinting of audio and
video. Steganography deceived with
cryptography, where we transform the message
so as to make its meaning cryptic to malicious
people who block it. Therefore, the definition of
breaking the system is different. In cryptography,
the system is broken when the attacker can read
the secret message. Breaking a steganography
system needs the attacker to detect that
steganography [3] has been used and he is able to
read the embedded message. In addition, the
security of classical steganography system relies
on secrecy of the data encoding system. Once the
encoding system is known, the steganography
system is defeated. The distinction between
cryptography and steganography is an important
one, and is summarized by the following table.
Steganography Cryptography
Unknown Message
passing.
known Message
passing.
Steganography
Prevents discovery of
the very Existence of
Communication.
Encryption prevents
An Authorized party
from Discovering The
Contents of a
communication.
Little Known
Technology.
Common Technology.
Technology still Being
Developed for Certain
Formats.
Most Of The
Algorithms Known by
All.
Once Detected
message is known.
Strong Current
Algorithms are
Currently resistant to
Attack. Large Amount
of Computing power is
Required For
Cracking.
Steganography does
not Alter the Structure
Of the secret Message.
Cryptography does not
Alter the Structure Of
the secret Message.
Steganography can be
used in conjunction
with cryptography by
hiding an encrypted
message.
Steganography [8]
cannot be used to adapt
the Robustness of
cryptographic System.
The End Result of
Information Hiding Is
Stego Image.
The End of Result is
Cryptography is
ciphertext.
Table1.Comparison
COMBINED CRYPTO-STEGANOGRAPHY
Steganography is not the same as cryptography
Data hiding techniques have been widely used to
transmission of hiding secret message for long
time. Ensuring data security is a big challenge
for computer users. Business men, professionals,
and home users all have some important data that
they want to secure from others. Even though
both methods provide security, to add multiple
layers of security it is always a good practice to
use Cryptography and Steganography [7]
together. By combining, the data encryption can
be done by a software and then embed the cipher
text in an image or any other media with the help
of stego key. The combination of these two
methods will enhance the security of the data
embedded. This combined chemistry will satisfy
the requirements such as capacity, security and
robustness for secure data transmission over an
open channel. A pictorial representation of the
combined concept of cryptography and
steganography is depicted in figure 2.
International Journal of Exploring Emerging Trends in Engineering (IJEETE)
Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM
ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 4
Fig 3.Combination of steganography and
Cryptography
In figure 3, both the methods are combined by
encrypting message with cryptography and then
covering the encrypted message using
steganography [9]. The Concluding Stego-image
can be pass on without affirming that secret
information is being changed. If an attacker want
to break the steganographic technique to detect
the message from the stego-object, he would still
require the cryptographic decoding key to
decipher the encrypted message.
III. CONCLUSION
We presented a classification of network security
techniques. We gave emphasis on steganography
techniques. Steganography and cryptography are
very suitable technique to achieve secrecy in
communication. If both the techniques:
cryptography and steganography is used then the
communication becomes double secured.
IV. REFERENCES
[1] Neha Sharma, J.S. Bhatia and Dr. Neena
Gupta, “An Encrypto-Stego Technique Based
secure data Transmission System”, PEC,
Chandigarh.
[2] I. Venkata Sai Manoj, “Cryptography and
Steganography”, International Journal of
Computer Applications (0975 – 8887), Volume 1
– No.12
[3] Alan Siper, Roger Farley and Craig
Lombardo, “The Rise of Steganography”,
Proceedings of Student/Faculty Research Day,
CSIS, Pace University, May 6th, 2005.
[4] B B Zaidan, A.A Zaidan, A.K. Al-Frajat and
H.A. Jalab, “On the Differences between Hiding
Information and Cryptography Techniques: An
Overview”, Journal of Applied Sciences 10(15):
1650-1655, 2010
[5] Domenico Bloisi and Luca Iocchi, “Image
Based Steganography and Cryptography”,
Sapienza University of Rome, Italy.
[6] Kallam Ravindra Babu, Dr. S.Udaya Kumar,
r. A.Vinaya Babu, “A Survey on Cryptography
and Steganography Methods for Information
Security”, Internaltional Journal of Computer
Applications (0975-8887), Volume 12 – No. 2,
November 2010.
[7] Dipti Kapoor Sarmah, Neha bajpai, “
Proposed System for Data Hiding Using
Cryptography and Steganography”, International
Journal of Computer Applications (0975 –
8887), Volume 8 – No. 9, October 2010.
[8] Eiji Kawaguchi and Richard O. Eason,
“Principle and applications of BPCS-
Steganography”, Kyushu Institute of
Technology, Kitakyushu, Japan, University of
Maine, Orono, Maine 04469-5708.
[9]Sashikala Channalli and Ajay Jadhav,
“Steganography An Art of Hiding Data”,
International Journal on Computer Science and
Engineering Vol.1 (3), 2009, 137-141.
AUTHOR’S BIBLOGRAPHY
Priyanka, pursuing her M.tech in
Computer Engineering from
UCOE, Punjabi University Patiala
and currently working as Lecturer
in Computer Science And
Engineering, Desh Bhagat
University , Mandi Gobindgarh.
Lal Chand Panwar pursuing his
Ph.D. in Computer Engineering
from UCOE, Punjabi University
Patiala and currently working as
Assistant Professor in Computer
Engineering from UCOE, Punjabi
University Patiala.

More Related Content

Similar to ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY

A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
 
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesIRJAES Editor
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyAlexander Decker
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSIJNSA Journal
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemEditor IJMTER
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
 

Similar to ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY (20)

A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security Issues
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 
N45028390
N45028390N45028390
N45028390
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and Steganography
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
 
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSHYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Analysis of Cryptography Techniques
Analysis of Cryptography TechniquesAnalysis of Cryptography Techniques
Analysis of Cryptography Techniques
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish AlgorithmsPerformance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 

More from Asia Smith

PPT - Custom Term Paper PowerPoint Presentation, Free Dow
PPT - Custom Term Paper PowerPoint Presentation, Free DowPPT - Custom Term Paper PowerPoint Presentation, Free Dow
PPT - Custom Term Paper PowerPoint Presentation, Free DowAsia Smith
 
PPT - Expository Text PowerPoint Presentation, F
PPT - Expository Text PowerPoint Presentation, FPPT - Expository Text PowerPoint Presentation, F
PPT - Expository Text PowerPoint Presentation, FAsia Smith
 
Writing A Motivational Letter Outlet Discounts, Save 64
Writing A Motivational Letter Outlet Discounts, Save 64Writing A Motivational Letter Outlet Discounts, Save 64
Writing A Motivational Letter Outlet Discounts, Save 64Asia Smith
 
6 Ways To Write A Brief Description Of Yourself - Wi
6 Ways To Write A Brief Description Of Yourself - Wi6 Ways To Write A Brief Description Of Yourself - Wi
6 Ways To Write A Brief Description Of Yourself - WiAsia Smith
 
Ant Writing Royalty Free Stock Images - Image 158
Ant Writing Royalty Free Stock Images - Image 158Ant Writing Royalty Free Stock Images - Image 158
Ant Writing Royalty Free Stock Images - Image 158Asia Smith
 
Ice Cream Paper Teacher Created Resources, Superki
Ice Cream Paper Teacher Created Resources, SuperkiIce Cream Paper Teacher Created Resources, Superki
Ice Cream Paper Teacher Created Resources, SuperkiAsia Smith
 
Work Experience Essay - GCSE English - Marked B
Work Experience Essay - GCSE English - Marked BWork Experience Essay - GCSE English - Marked B
Work Experience Essay - GCSE English - Marked BAsia Smith
 
Formal Letter Format Useful Example And Writing Tips
Formal Letter Format Useful Example And Writing TipsFormal Letter Format Useful Example And Writing Tips
Formal Letter Format Useful Example And Writing TipsAsia Smith
 
The Importance Of Writing Cafeviena.Pe
The Importance Of Writing Cafeviena.PeThe Importance Of Writing Cafeviena.Pe
The Importance Of Writing Cafeviena.PeAsia Smith
 
The 9 Best College Essay Writing Services In 2023 R
The 9 Best College Essay Writing Services In 2023 RThe 9 Best College Essay Writing Services In 2023 R
The 9 Best College Essay Writing Services In 2023 RAsia Smith
 
Music Training Material - English For Research Paper Writing - St
Music Training Material - English For Research Paper Writing - StMusic Training Material - English For Research Paper Writing - St
Music Training Material - English For Research Paper Writing - StAsia Smith
 
Free Speech Examples For Students To Craft A Best S
Free Speech Examples For Students To Craft A Best SFree Speech Examples For Students To Craft A Best S
Free Speech Examples For Students To Craft A Best SAsia Smith
 
Sample Essay About Career Goals
Sample Essay About Career GoalsSample Essay About Career Goals
Sample Essay About Career GoalsAsia Smith
 
015 Editorial V Essay Thatsnotus
015 Editorial V Essay Thatsnotus015 Editorial V Essay Thatsnotus
015 Editorial V Essay ThatsnotusAsia Smith
 
Analytical Rubrics Essays - Writefiction
Analytical Rubrics Essays - WritefictionAnalytical Rubrics Essays - Writefiction
Analytical Rubrics Essays - WritefictionAsia Smith
 
Short Story Writing Process Chart Writing Short Storie
Short Story Writing Process Chart Writing Short StorieShort Story Writing Process Chart Writing Short Storie
Short Story Writing Process Chart Writing Short StorieAsia Smith
 
Writing Paper Fichrios Decorados, Papis De Escri
Writing Paper Fichrios Decorados, Papis De EscriWriting Paper Fichrios Decorados, Papis De Escri
Writing Paper Fichrios Decorados, Papis De EscriAsia Smith
 
Santa Letterhead Printable - Inspiration Made Simple
Santa Letterhead Printable - Inspiration Made SimpleSanta Letterhead Printable - Inspiration Made Simple
Santa Letterhead Printable - Inspiration Made SimpleAsia Smith
 
Scroll Templates, Writing Practic
Scroll Templates, Writing PracticScroll Templates, Writing Practic
Scroll Templates, Writing PracticAsia Smith
 
Synthesis Essay Help What Is A Synthesis P
Synthesis Essay Help What Is A Synthesis PSynthesis Essay Help What Is A Synthesis P
Synthesis Essay Help What Is A Synthesis PAsia Smith
 

More from Asia Smith (20)

PPT - Custom Term Paper PowerPoint Presentation, Free Dow
PPT - Custom Term Paper PowerPoint Presentation, Free DowPPT - Custom Term Paper PowerPoint Presentation, Free Dow
PPT - Custom Term Paper PowerPoint Presentation, Free Dow
 
PPT - Expository Text PowerPoint Presentation, F
PPT - Expository Text PowerPoint Presentation, FPPT - Expository Text PowerPoint Presentation, F
PPT - Expository Text PowerPoint Presentation, F
 
Writing A Motivational Letter Outlet Discounts, Save 64
Writing A Motivational Letter Outlet Discounts, Save 64Writing A Motivational Letter Outlet Discounts, Save 64
Writing A Motivational Letter Outlet Discounts, Save 64
 
6 Ways To Write A Brief Description Of Yourself - Wi
6 Ways To Write A Brief Description Of Yourself - Wi6 Ways To Write A Brief Description Of Yourself - Wi
6 Ways To Write A Brief Description Of Yourself - Wi
 
Ant Writing Royalty Free Stock Images - Image 158
Ant Writing Royalty Free Stock Images - Image 158Ant Writing Royalty Free Stock Images - Image 158
Ant Writing Royalty Free Stock Images - Image 158
 
Ice Cream Paper Teacher Created Resources, Superki
Ice Cream Paper Teacher Created Resources, SuperkiIce Cream Paper Teacher Created Resources, Superki
Ice Cream Paper Teacher Created Resources, Superki
 
Work Experience Essay - GCSE English - Marked B
Work Experience Essay - GCSE English - Marked BWork Experience Essay - GCSE English - Marked B
Work Experience Essay - GCSE English - Marked B
 
Formal Letter Format Useful Example And Writing Tips
Formal Letter Format Useful Example And Writing TipsFormal Letter Format Useful Example And Writing Tips
Formal Letter Format Useful Example And Writing Tips
 
The Importance Of Writing Cafeviena.Pe
The Importance Of Writing Cafeviena.PeThe Importance Of Writing Cafeviena.Pe
The Importance Of Writing Cafeviena.Pe
 
The 9 Best College Essay Writing Services In 2023 R
The 9 Best College Essay Writing Services In 2023 RThe 9 Best College Essay Writing Services In 2023 R
The 9 Best College Essay Writing Services In 2023 R
 
Music Training Material - English For Research Paper Writing - St
Music Training Material - English For Research Paper Writing - StMusic Training Material - English For Research Paper Writing - St
Music Training Material - English For Research Paper Writing - St
 
Free Speech Examples For Students To Craft A Best S
Free Speech Examples For Students To Craft A Best SFree Speech Examples For Students To Craft A Best S
Free Speech Examples For Students To Craft A Best S
 
Sample Essay About Career Goals
Sample Essay About Career GoalsSample Essay About Career Goals
Sample Essay About Career Goals
 
015 Editorial V Essay Thatsnotus
015 Editorial V Essay Thatsnotus015 Editorial V Essay Thatsnotus
015 Editorial V Essay Thatsnotus
 
Analytical Rubrics Essays - Writefiction
Analytical Rubrics Essays - WritefictionAnalytical Rubrics Essays - Writefiction
Analytical Rubrics Essays - Writefiction
 
Short Story Writing Process Chart Writing Short Storie
Short Story Writing Process Chart Writing Short StorieShort Story Writing Process Chart Writing Short Storie
Short Story Writing Process Chart Writing Short Storie
 
Writing Paper Fichrios Decorados, Papis De Escri
Writing Paper Fichrios Decorados, Papis De EscriWriting Paper Fichrios Decorados, Papis De Escri
Writing Paper Fichrios Decorados, Papis De Escri
 
Santa Letterhead Printable - Inspiration Made Simple
Santa Letterhead Printable - Inspiration Made SimpleSanta Letterhead Printable - Inspiration Made Simple
Santa Letterhead Printable - Inspiration Made Simple
 
Scroll Templates, Writing Practic
Scroll Templates, Writing PracticScroll Templates, Writing Practic
Scroll Templates, Writing Practic
 
Synthesis Essay Help What Is A Synthesis P
Synthesis Essay Help What Is A Synthesis PSynthesis Essay Help What Is A Synthesis P
Synthesis Essay Help What Is A Synthesis P
 

Recently uploaded

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY

  • 1. International Journal of Exploring Emerging Trends in Engineering (IJEETE) Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 1 ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY 1 Priyanka, 2 Lal Chand Panwar Department of C.S.E, DBU University, Gobindgarh Department of C.E UCOE, Punjabi University, Patiala priyanka.kataria05@gmail.com, lcpanwar@yahoo.com ABSTRACT Security techniques such as: secrecy, authentication, non-repudiation and integrity control. Secrecy techniques are in two categories: cryptography and steganography. Steganography and cryptography is a very useful technique to achieve secrecy in communication. One hides the existence of the message as well as the further distorts the message itself. By means of cryptography, the data is transformed into some other gibberish form and then the encrypted data is transmitted. In steganography, the data is embedded in an image file and the image file is transmitted. This paper spotlights on the potency of combining cryptography and steganography methods to enhance the security of communication over an open channel. Keywords- Cryptography, Decryption, Encryption, Steganography . I. INTRODUCTION Cryptography and Steganography are well known and widely used techniques that manipulate (change) information in order to cipher or hide their existence respectively. Steganography is the way of communication in which hides the existence of the communication. Cryptography scuttles a message so it cannot be understood; the Steganography hides the message so it cannot be seen. Even though both methods offer security, a study is made to combine both cryptography and Steganography methods into one system for enhanced confidentiality and security. Cryptography systems that use a single key is called symmetric key systems that both the sender and the receiver have, and public-key systems in which two keys are used, a public key known to everyone and a abstract. Fig 1. A Model Of Steganographic Process With Cryptographic [1] Classification of Cryptography and Steganography: Cryptography defines the sculpture and science of transforming data into a sequence of bits that appears as random and meaningless to a side observer or attacker. 1. Transforming plain text to cipher text. The entire encryption algorithms are based on two general principles: substitution, in which each element in the plaintext is mapped into an additional element, and transposition, in which elements in the basic text are rearranged. The elementary requirement is that no information be lost. 2. Number of keys used. There are some standards methods which are used with cryptography such as furtive key, public key, digital signature as well as hash function. Secret Key (Symmetric): With secret key cryptography, a single key is used for mutually
  • 2. International Journal of Exploring Emerging Trends in Engineering (IJEETE) Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 2 encryption and decryption. The dispatcher uses the key to encrypt the basic text furthermore sends the cipher text to the receiver. The receiver applies the same key to decrypt the message and recover the plaintext. Because a solo key is used for both functions, secret key cryptography is moreover called as symmetric encryption. Public Key: Public key cryptography has been said to be the most significant new development in cryptography. Study described two-key crypto system in which two parties could engage in a secure communication over an insecure communications channel without having to share a secret key. Digital Signature: The use of digital signature came from the need of ensuring the authentication. The digital signature is further like stamp or signature of the sender which is embedded together with the data and encrypts it with the private key in order to send it to the additional party. In addition, the signature declares that any change made to the data that has been signed is easy to detect by the receiver. Hash Function: The hash function is a one technique encryption, the hash function is a well-defined process or mathematical formula that represents a small size of bits which is generated from a bulky sized file, the outcome of this function can be called hash code otherwise hashes. The generating of hash code is faster than supplementary methods which make it more desired for authentication and integrity. Cryptographic hash functions are to a great extent used for digital signature and cheap constructions are highly desirable. 3. for processing plain text. A block cipher processes the input one block of elements at a instance, producing an productivity block for every input block. A stream cipher processes the put in elements continuously, producing output one element at a instance, as it goes along. The proposed algorithm uses a changeover cipher method. It is a symmetric key algorithm using the technique of stream cipher. STEGANOGRAPHY The word steganography comes from the Greek Steganos, which mean covered or secret and graphy means writing or drawing. Therefore, steganography [2] means, literally, covered writing. The basic model of steganography consists of Carrier, Message, Embedding algorithm and Stego key. The model for steganography is shown in Figure 2. Carrier is also known as a cover-object, which embeds the message and serves to hide its presence. Since then, the steganography approaches can be divided into three types [4]: Fig 2. Model of Steganography Pure Steganography: This technique simply uses the steganography approach only without combining other methods. It is working on hiding information within cover carrier. Secret Key Steganography: The secret key steganography use the combination of the secret key cryptography technique and the steganography approach. The idea of this type is to encrypt the secret message or data by secret key approach and to hide the encrypted data within cover carrier. Public Key Steganography: The last type of steganography is to combine the public key cryptography approach and the [6] steganography approach. The idea of this type is to encrypt the secret data using the public key approach and then hide the encrypted data within cover carrier.
  • 3. International Journal of Exploring Emerging Trends in Engineering (IJEETE) Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 3 II. PROPOSED APPROACH Basically, the purpose of cryptography and steganography is to provide secret communication. Steganography [5] is:” Hiding a secret message within a larger one in such a way that others cannot discern the presence or contents of the hidden message” and Cryptography is “The process or skill of communicating in, or deciphering secret writing or ciphers.” Steganography can be used to cloak hidden messages in image, audio and even text files. Now, it is gaining new popularity with the current industry demands for digital watermarking and fingerprinting of audio and video. Steganography deceived with cryptography, where we transform the message so as to make its meaning cryptic to malicious people who block it. Therefore, the definition of breaking the system is different. In cryptography, the system is broken when the attacker can read the secret message. Breaking a steganography system needs the attacker to detect that steganography [3] has been used and he is able to read the embedded message. In addition, the security of classical steganography system relies on secrecy of the data encoding system. Once the encoding system is known, the steganography system is defeated. The distinction between cryptography and steganography is an important one, and is summarized by the following table. Steganography Cryptography Unknown Message passing. known Message passing. Steganography Prevents discovery of the very Existence of Communication. Encryption prevents An Authorized party from Discovering The Contents of a communication. Little Known Technology. Common Technology. Technology still Being Developed for Certain Formats. Most Of The Algorithms Known by All. Once Detected message is known. Strong Current Algorithms are Currently resistant to Attack. Large Amount of Computing power is Required For Cracking. Steganography does not Alter the Structure Of the secret Message. Cryptography does not Alter the Structure Of the secret Message. Steganography can be used in conjunction with cryptography by hiding an encrypted message. Steganography [8] cannot be used to adapt the Robustness of cryptographic System. The End Result of Information Hiding Is Stego Image. The End of Result is Cryptography is ciphertext. Table1.Comparison COMBINED CRYPTO-STEGANOGRAPHY Steganography is not the same as cryptography Data hiding techniques have been widely used to transmission of hiding secret message for long time. Ensuring data security is a big challenge for computer users. Business men, professionals, and home users all have some important data that they want to secure from others. Even though both methods provide security, to add multiple layers of security it is always a good practice to use Cryptography and Steganography [7] together. By combining, the data encryption can be done by a software and then embed the cipher text in an image or any other media with the help of stego key. The combination of these two methods will enhance the security of the data embedded. This combined chemistry will satisfy the requirements such as capacity, security and robustness for secure data transmission over an open channel. A pictorial representation of the combined concept of cryptography and steganography is depicted in figure 2.
  • 4. International Journal of Exploring Emerging Trends in Engineering (IJEETE) Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 4 Fig 3.Combination of steganography and Cryptography In figure 3, both the methods are combined by encrypting message with cryptography and then covering the encrypted message using steganography [9]. The Concluding Stego-image can be pass on without affirming that secret information is being changed. If an attacker want to break the steganographic technique to detect the message from the stego-object, he would still require the cryptographic decoding key to decipher the encrypted message. III. CONCLUSION We presented a classification of network security techniques. We gave emphasis on steganography techniques. Steganography and cryptography are very suitable technique to achieve secrecy in communication. If both the techniques: cryptography and steganography is used then the communication becomes double secured. IV. REFERENCES [1] Neha Sharma, J.S. Bhatia and Dr. Neena Gupta, “An Encrypto-Stego Technique Based secure data Transmission System”, PEC, Chandigarh. [2] I. Venkata Sai Manoj, “Cryptography and Steganography”, International Journal of Computer Applications (0975 – 8887), Volume 1 – No.12 [3] Alan Siper, Roger Farley and Craig Lombardo, “The Rise of Steganography”, Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 6th, 2005. [4] B B Zaidan, A.A Zaidan, A.K. Al-Frajat and H.A. Jalab, “On the Differences between Hiding Information and Cryptography Techniques: An Overview”, Journal of Applied Sciences 10(15): 1650-1655, 2010 [5] Domenico Bloisi and Luca Iocchi, “Image Based Steganography and Cryptography”, Sapienza University of Rome, Italy. [6] Kallam Ravindra Babu, Dr. S.Udaya Kumar, r. A.Vinaya Babu, “A Survey on Cryptography and Steganography Methods for Information Security”, Internaltional Journal of Computer Applications (0975-8887), Volume 12 – No. 2, November 2010. [7] Dipti Kapoor Sarmah, Neha bajpai, “ Proposed System for Data Hiding Using Cryptography and Steganography”, International Journal of Computer Applications (0975 – 8887), Volume 8 – No. 9, October 2010. [8] Eiji Kawaguchi and Richard O. Eason, “Principle and applications of BPCS- Steganography”, Kyushu Institute of Technology, Kitakyushu, Japan, University of Maine, Orono, Maine 04469-5708. [9]Sashikala Channalli and Ajay Jadhav, “Steganography An Art of Hiding Data”, International Journal on Computer Science and Engineering Vol.1 (3), 2009, 137-141. AUTHOR’S BIBLOGRAPHY Priyanka, pursuing her M.tech in Computer Engineering from UCOE, Punjabi University Patiala and currently working as Lecturer in Computer Science And Engineering, Desh Bhagat University , Mandi Gobindgarh. Lal Chand Panwar pursuing his Ph.D. in Computer Engineering from UCOE, Punjabi University Patiala and currently working as Assistant Professor in Computer Engineering from UCOE, Punjabi University Patiala.