Submit Search
Upload
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
•
0 likes
•
3 views
Asia Smith
Follow
Custom Writing Service http://StudyHub.vip/ASSOCIATION-OF-CRYPTOGRAPHY-AND-STEGANO 👈
Read less
Read more
Education
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Paper id 27201444
Paper id 27201444
IJRAT
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
iosrjce
H017255560
H017255560
IOSR Journals
An Overview of Steganography
An Overview of Steganography
IOSR Journals
C01111519
C01111519
IOSR Journals
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
inventionjournals
Cn ppt
Cn ppt
Ashish Agarwal
319 325
319 325
Editor IJARCET
Recommended
Paper id 27201444
Paper id 27201444
IJRAT
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
iosrjce
H017255560
H017255560
IOSR Journals
An Overview of Steganography
An Overview of Steganography
IOSR Journals
C01111519
C01111519
IOSR Journals
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
inventionjournals
Cn ppt
Cn ppt
Ashish Agarwal
319 325
319 325
Editor IJARCET
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
ijtsrd
T0 numtq0nju=
T0 numtq0nju=
International Journal of Science and Research (IJSR)
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security Issues
IRJAES Editor
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
csandit
N45028390
N45028390
IJERA Editor
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Editor IJCATR
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Editor IJCATR
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Editor IJCATR
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
Alexander Decker
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and Steganography
MangaiK4
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
acijjournal
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
IJNSA Journal
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
Editor IJMTER
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
About Steganography
About Steganography
Sudhansh Gupta
Public key cryptography
Public key cryptography
Lilies DLiestyowati
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
Analysis of Cryptography Techniques
Analysis of Cryptography Techniques
editor1knowledgecuddle
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd
PPT - Custom Term Paper PowerPoint Presentation, Free Dow
PPT - Custom Term Paper PowerPoint Presentation, Free Dow
Asia Smith
PPT - Expository Text PowerPoint Presentation, F
PPT - Expository Text PowerPoint Presentation, F
Asia Smith
More Related Content
Similar to ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
ijtsrd
T0 numtq0nju=
T0 numtq0nju=
International Journal of Science and Research (IJSR)
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security Issues
IRJAES Editor
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
csandit
N45028390
N45028390
IJERA Editor
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Editor IJCATR
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Editor IJCATR
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Editor IJCATR
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
Alexander Decker
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and Steganography
MangaiK4
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
acijjournal
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
IJNSA Journal
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
Editor IJMTER
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
About Steganography
About Steganography
Sudhansh Gupta
Public key cryptography
Public key cryptography
Lilies DLiestyowati
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
Analysis of Cryptography Techniques
Analysis of Cryptography Techniques
editor1knowledgecuddle
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd
Similar to ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
(20)
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
T0 numtq0nju=
T0 numtq0nju=
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security Issues
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
N45028390
N45028390
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and Steganography
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
About Steganography
About Steganography
Public key cryptography
Public key cryptography
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
Analysis of Cryptography Techniques
Analysis of Cryptography Techniques
Performance Comparison of File Security System using TEA and Blowfish Algorithms
Performance Comparison of File Security System using TEA and Blowfish Algorithms
More from Asia Smith
PPT - Custom Term Paper PowerPoint Presentation, Free Dow
PPT - Custom Term Paper PowerPoint Presentation, Free Dow
Asia Smith
PPT - Expository Text PowerPoint Presentation, F
PPT - Expository Text PowerPoint Presentation, F
Asia Smith
Writing A Motivational Letter Outlet Discounts, Save 64
Writing A Motivational Letter Outlet Discounts, Save 64
Asia Smith
6 Ways To Write A Brief Description Of Yourself - Wi
6 Ways To Write A Brief Description Of Yourself - Wi
Asia Smith
Ant Writing Royalty Free Stock Images - Image 158
Ant Writing Royalty Free Stock Images - Image 158
Asia Smith
Ice Cream Paper Teacher Created Resources, Superki
Ice Cream Paper Teacher Created Resources, Superki
Asia Smith
Work Experience Essay - GCSE English - Marked B
Work Experience Essay - GCSE English - Marked B
Asia Smith
Formal Letter Format Useful Example And Writing Tips
Formal Letter Format Useful Example And Writing Tips
Asia Smith
The Importance Of Writing Cafeviena.Pe
The Importance Of Writing Cafeviena.Pe
Asia Smith
The 9 Best College Essay Writing Services In 2023 R
The 9 Best College Essay Writing Services In 2023 R
Asia Smith
Music Training Material - English For Research Paper Writing - St
Music Training Material - English For Research Paper Writing - St
Asia Smith
Free Speech Examples For Students To Craft A Best S
Free Speech Examples For Students To Craft A Best S
Asia Smith
Sample Essay About Career Goals
Sample Essay About Career Goals
Asia Smith
015 Editorial V Essay Thatsnotus
015 Editorial V Essay Thatsnotus
Asia Smith
Analytical Rubrics Essays - Writefiction
Analytical Rubrics Essays - Writefiction
Asia Smith
Short Story Writing Process Chart Writing Short Storie
Short Story Writing Process Chart Writing Short Storie
Asia Smith
Writing Paper Fichrios Decorados, Papis De Escri
Writing Paper Fichrios Decorados, Papis De Escri
Asia Smith
Santa Letterhead Printable - Inspiration Made Simple
Santa Letterhead Printable - Inspiration Made Simple
Asia Smith
Scroll Templates, Writing Practic
Scroll Templates, Writing Practic
Asia Smith
Synthesis Essay Help What Is A Synthesis P
Synthesis Essay Help What Is A Synthesis P
Asia Smith
More from Asia Smith
(20)
PPT - Custom Term Paper PowerPoint Presentation, Free Dow
PPT - Custom Term Paper PowerPoint Presentation, Free Dow
PPT - Expository Text PowerPoint Presentation, F
PPT - Expository Text PowerPoint Presentation, F
Writing A Motivational Letter Outlet Discounts, Save 64
Writing A Motivational Letter Outlet Discounts, Save 64
6 Ways To Write A Brief Description Of Yourself - Wi
6 Ways To Write A Brief Description Of Yourself - Wi
Ant Writing Royalty Free Stock Images - Image 158
Ant Writing Royalty Free Stock Images - Image 158
Ice Cream Paper Teacher Created Resources, Superki
Ice Cream Paper Teacher Created Resources, Superki
Work Experience Essay - GCSE English - Marked B
Work Experience Essay - GCSE English - Marked B
Formal Letter Format Useful Example And Writing Tips
Formal Letter Format Useful Example And Writing Tips
The Importance Of Writing Cafeviena.Pe
The Importance Of Writing Cafeviena.Pe
The 9 Best College Essay Writing Services In 2023 R
The 9 Best College Essay Writing Services In 2023 R
Music Training Material - English For Research Paper Writing - St
Music Training Material - English For Research Paper Writing - St
Free Speech Examples For Students To Craft A Best S
Free Speech Examples For Students To Craft A Best S
Sample Essay About Career Goals
Sample Essay About Career Goals
015 Editorial V Essay Thatsnotus
015 Editorial V Essay Thatsnotus
Analytical Rubrics Essays - Writefiction
Analytical Rubrics Essays - Writefiction
Short Story Writing Process Chart Writing Short Storie
Short Story Writing Process Chart Writing Short Storie
Writing Paper Fichrios Decorados, Papis De Escri
Writing Paper Fichrios Decorados, Papis De Escri
Santa Letterhead Printable - Inspiration Made Simple
Santa Letterhead Printable - Inspiration Made Simple
Scroll Templates, Writing Practic
Scroll Templates, Writing Practic
Synthesis Essay Help What Is A Synthesis P
Synthesis Essay Help What Is A Synthesis P
Recently uploaded
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
UjwalaBharambe
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
thorishapillay1
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
InMediaRes1
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
Mahmoud M. Sallam
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
pboyjonauth
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
JiesonDelaCerna
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
OH TEIK BIN
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
manuelaromero2013
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
9953056974 Low Rate Call Girls In Saket, Delhi NCR
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
M56BOOKSTORE PRODUCT/SERVICE
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
9953056974 Low Rate Call Girls In Saket, Delhi NCR
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
ssuser54595a
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
UnboundStockton
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
eniolaolutunde
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
Eyham Joco
Full Stack Web Development Course for Beginners
Full Stack Web Development Course for Beginners
Sabitha Banu
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
CapitolTechU
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
iammrhaywood
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
nomboosow
Recently uploaded
(20)
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
Full Stack Web Development Course for Beginners
Full Stack Web Development Course for Beginners
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
1.
International Journal of
Exploring Emerging Trends in Engineering (IJEETE) Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 1 ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY 1 Priyanka, 2 Lal Chand Panwar Department of C.S.E, DBU University, Gobindgarh Department of C.E UCOE, Punjabi University, Patiala priyanka.kataria05@gmail.com, lcpanwar@yahoo.com ABSTRACT Security techniques such as: secrecy, authentication, non-repudiation and integrity control. Secrecy techniques are in two categories: cryptography and steganography. Steganography and cryptography is a very useful technique to achieve secrecy in communication. One hides the existence of the message as well as the further distorts the message itself. By means of cryptography, the data is transformed into some other gibberish form and then the encrypted data is transmitted. In steganography, the data is embedded in an image file and the image file is transmitted. This paper spotlights on the potency of combining cryptography and steganography methods to enhance the security of communication over an open channel. Keywords- Cryptography, Decryption, Encryption, Steganography . I. INTRODUCTION Cryptography and Steganography are well known and widely used techniques that manipulate (change) information in order to cipher or hide their existence respectively. Steganography is the way of communication in which hides the existence of the communication. Cryptography scuttles a message so it cannot be understood; the Steganography hides the message so it cannot be seen. Even though both methods offer security, a study is made to combine both cryptography and Steganography methods into one system for enhanced confidentiality and security. Cryptography systems that use a single key is called symmetric key systems that both the sender and the receiver have, and public-key systems in which two keys are used, a public key known to everyone and a abstract. Fig 1. A Model Of Steganographic Process With Cryptographic [1] Classification of Cryptography and Steganography: Cryptography defines the sculpture and science of transforming data into a sequence of bits that appears as random and meaningless to a side observer or attacker. 1. Transforming plain text to cipher text. The entire encryption algorithms are based on two general principles: substitution, in which each element in the plaintext is mapped into an additional element, and transposition, in which elements in the basic text are rearranged. The elementary requirement is that no information be lost. 2. Number of keys used. There are some standards methods which are used with cryptography such as furtive key, public key, digital signature as well as hash function. Secret Key (Symmetric): With secret key cryptography, a single key is used for mutually
2.
International Journal of
Exploring Emerging Trends in Engineering (IJEETE) Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 2 encryption and decryption. The dispatcher uses the key to encrypt the basic text furthermore sends the cipher text to the receiver. The receiver applies the same key to decrypt the message and recover the plaintext. Because a solo key is used for both functions, secret key cryptography is moreover called as symmetric encryption. Public Key: Public key cryptography has been said to be the most significant new development in cryptography. Study described two-key crypto system in which two parties could engage in a secure communication over an insecure communications channel without having to share a secret key. Digital Signature: The use of digital signature came from the need of ensuring the authentication. The digital signature is further like stamp or signature of the sender which is embedded together with the data and encrypts it with the private key in order to send it to the additional party. In addition, the signature declares that any change made to the data that has been signed is easy to detect by the receiver. Hash Function: The hash function is a one technique encryption, the hash function is a well-defined process or mathematical formula that represents a small size of bits which is generated from a bulky sized file, the outcome of this function can be called hash code otherwise hashes. The generating of hash code is faster than supplementary methods which make it more desired for authentication and integrity. Cryptographic hash functions are to a great extent used for digital signature and cheap constructions are highly desirable. 3. for processing plain text. A block cipher processes the input one block of elements at a instance, producing an productivity block for every input block. A stream cipher processes the put in elements continuously, producing output one element at a instance, as it goes along. The proposed algorithm uses a changeover cipher method. It is a symmetric key algorithm using the technique of stream cipher. STEGANOGRAPHY The word steganography comes from the Greek Steganos, which mean covered or secret and graphy means writing or drawing. Therefore, steganography [2] means, literally, covered writing. The basic model of steganography consists of Carrier, Message, Embedding algorithm and Stego key. The model for steganography is shown in Figure 2. Carrier is also known as a cover-object, which embeds the message and serves to hide its presence. Since then, the steganography approaches can be divided into three types [4]: Fig 2. Model of Steganography Pure Steganography: This technique simply uses the steganography approach only without combining other methods. It is working on hiding information within cover carrier. Secret Key Steganography: The secret key steganography use the combination of the secret key cryptography technique and the steganography approach. The idea of this type is to encrypt the secret message or data by secret key approach and to hide the encrypted data within cover carrier. Public Key Steganography: The last type of steganography is to combine the public key cryptography approach and the [6] steganography approach. The idea of this type is to encrypt the secret data using the public key approach and then hide the encrypted data within cover carrier.
3.
International Journal of
Exploring Emerging Trends in Engineering (IJEETE) Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 3 II. PROPOSED APPROACH Basically, the purpose of cryptography and steganography is to provide secret communication. Steganography [5] is:” Hiding a secret message within a larger one in such a way that others cannot discern the presence or contents of the hidden message” and Cryptography is “The process or skill of communicating in, or deciphering secret writing or ciphers.” Steganography can be used to cloak hidden messages in image, audio and even text files. Now, it is gaining new popularity with the current industry demands for digital watermarking and fingerprinting of audio and video. Steganography deceived with cryptography, where we transform the message so as to make its meaning cryptic to malicious people who block it. Therefore, the definition of breaking the system is different. In cryptography, the system is broken when the attacker can read the secret message. Breaking a steganography system needs the attacker to detect that steganography [3] has been used and he is able to read the embedded message. In addition, the security of classical steganography system relies on secrecy of the data encoding system. Once the encoding system is known, the steganography system is defeated. The distinction between cryptography and steganography is an important one, and is summarized by the following table. Steganography Cryptography Unknown Message passing. known Message passing. Steganography Prevents discovery of the very Existence of Communication. Encryption prevents An Authorized party from Discovering The Contents of a communication. Little Known Technology. Common Technology. Technology still Being Developed for Certain Formats. Most Of The Algorithms Known by All. Once Detected message is known. Strong Current Algorithms are Currently resistant to Attack. Large Amount of Computing power is Required For Cracking. Steganography does not Alter the Structure Of the secret Message. Cryptography does not Alter the Structure Of the secret Message. Steganography can be used in conjunction with cryptography by hiding an encrypted message. Steganography [8] cannot be used to adapt the Robustness of cryptographic System. The End Result of Information Hiding Is Stego Image. The End of Result is Cryptography is ciphertext. Table1.Comparison COMBINED CRYPTO-STEGANOGRAPHY Steganography is not the same as cryptography Data hiding techniques have been widely used to transmission of hiding secret message for long time. Ensuring data security is a big challenge for computer users. Business men, professionals, and home users all have some important data that they want to secure from others. Even though both methods provide security, to add multiple layers of security it is always a good practice to use Cryptography and Steganography [7] together. By combining, the data encryption can be done by a software and then embed the cipher text in an image or any other media with the help of stego key. The combination of these two methods will enhance the security of the data embedded. This combined chemistry will satisfy the requirements such as capacity, security and robustness for secure data transmission over an open channel. A pictorial representation of the combined concept of cryptography and steganography is depicted in figure 2.
4.
International Journal of
Exploring Emerging Trends in Engineering (IJEETE) Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 4 Fig 3.Combination of steganography and Cryptography In figure 3, both the methods are combined by encrypting message with cryptography and then covering the encrypted message using steganography [9]. The Concluding Stego-image can be pass on without affirming that secret information is being changed. If an attacker want to break the steganographic technique to detect the message from the stego-object, he would still require the cryptographic decoding key to decipher the encrypted message. III. CONCLUSION We presented a classification of network security techniques. We gave emphasis on steganography techniques. Steganography and cryptography are very suitable technique to achieve secrecy in communication. If both the techniques: cryptography and steganography is used then the communication becomes double secured. IV. REFERENCES [1] Neha Sharma, J.S. Bhatia and Dr. Neena Gupta, “An Encrypto-Stego Technique Based secure data Transmission System”, PEC, Chandigarh. [2] I. Venkata Sai Manoj, “Cryptography and Steganography”, International Journal of Computer Applications (0975 – 8887), Volume 1 – No.12 [3] Alan Siper, Roger Farley and Craig Lombardo, “The Rise of Steganography”, Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 6th, 2005. [4] B B Zaidan, A.A Zaidan, A.K. Al-Frajat and H.A. Jalab, “On the Differences between Hiding Information and Cryptography Techniques: An Overview”, Journal of Applied Sciences 10(15): 1650-1655, 2010 [5] Domenico Bloisi and Luca Iocchi, “Image Based Steganography and Cryptography”, Sapienza University of Rome, Italy. [6] Kallam Ravindra Babu, Dr. S.Udaya Kumar, r. A.Vinaya Babu, “A Survey on Cryptography and Steganography Methods for Information Security”, Internaltional Journal of Computer Applications (0975-8887), Volume 12 – No. 2, November 2010. [7] Dipti Kapoor Sarmah, Neha bajpai, “ Proposed System for Data Hiding Using Cryptography and Steganography”, International Journal of Computer Applications (0975 – 8887), Volume 8 – No. 9, October 2010. [8] Eiji Kawaguchi and Richard O. Eason, “Principle and applications of BPCS- Steganography”, Kyushu Institute of Technology, Kitakyushu, Japan, University of Maine, Orono, Maine 04469-5708. [9]Sashikala Channalli and Ajay Jadhav, “Steganography An Art of Hiding Data”, International Journal on Computer Science and Engineering Vol.1 (3), 2009, 137-141. AUTHOR’S BIBLOGRAPHY Priyanka, pursuing her M.tech in Computer Engineering from UCOE, Punjabi University Patiala and currently working as Lecturer in Computer Science And Engineering, Desh Bhagat University , Mandi Gobindgarh. Lal Chand Panwar pursuing his Ph.D. in Computer Engineering from UCOE, Punjabi University Patiala and currently working as Assistant Professor in Computer Engineering from UCOE, Punjabi University Patiala.
Download now