A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography

被引:12
|
作者
Varghese, Fredy [1 ,2 ]
Sasikala, P. [3 ]
机构
[1] Vinayaka Missions Kirupananda Variyar Engn Coll, Salem, Tamil Nadu, India
[2] Naipunnya Inst Management & Informat Technol, Dept Comp Sci, Trichur, Kerala, India
[3] Vinayaka Missions Kirupananda Variyar Engn Coll, Dept Math, Salem, Tamil Nadu, India
关键词
Security; Cryptography; Steganography; Advanced encryption standard (AES); Data hiding; DISCRETE WAVELET TRANSFORM; AUDIO STEGANOGRAPHY; IMAGE; ENCRYPTION; ALGORITHM;
D O I
10.1007/s11277-023-10183-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
During the last few decades, digital communication has played a vital role in various sectors such as healthcare departments, banking, information technology companies, industries, and other fields. Nowadays, all data are transmitted over the Internet, which needs high protection for transmitting the original data from source to destination. In order to secure digital communication, cryptography and steganography methods are used to achieve data security over insecure and open networks like the Internet. Cryptography is the method of encrypting secret information in an unreadable structure. Based on the cryptography method, the original message can be distorted before data transmission. On the other hand, steganography covers secret data such as audio, image, text, and video. It can hide the message while transmitting the original information from one end to another. The data combines images, texts, audio and videos, which are communicated worldwide through the Internet. This review paper gives an analysis based on the concept of cryptography and steganography. It also presents a comparative approach using several encryption algorithms with several factors such as block size, key size, encryption speed, memory usage, and security level.
引用
收藏
页码:2291 / 2318
页数:28
相关论文
共 50 条
  • [21] Secure patients data transmission using XOR ciphering encryption and ECG steganography
    Patel, Shaheen S.
    Sankpal, S. V.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1311 - 1315
  • [22] A Secure Text Communication Scheme Based on Combination of Compression, Cryptography, and Steganography
    Saneja, Kirti
    Kumar, Mukesh
    Sharma, Pallavi
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 205 - 214
  • [23] Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review
    Mamta
    Khare, Mayank Deep
    Yadav, Chandra Shekhar
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN CONTROL, COMMUNICATION AND INFORMATION SYSTEMS (ICICCI-2017), 2017, : 413 - 416
  • [24] Secure Image Data Storage and Transmission Using ESP32-Cam and Raspberry Pi with Steganography
    Gokhale, Hrishikesh
    Satapathy, Chirag
    Syed, Ali Zoya
    INTERNET OF THINGS, GIOTS 2022, 2022, 13533 : 292 - 301
  • [25] EGCrypto: A Low-Complexity Elliptic Galois Cryptography Model for Secure Data Transmission in IoT
    Kaur, Manjit
    Alzubi, Ahmad Ali
    Walia, Tarandeep Singh
    Yadav, Vaishali
    Kumar, Naresh
    Singh, Dilbag
    Lee, Heung-No
    IEEE ACCESS, 2023, 11 : 90739 - 90748
  • [26] A Novel Technique for Secure Information Transmission in Videos Using Salt Cryptography
    Sharma, Nagesh
    Rathi, Rakesh
    Jain, Vinesh
    Saifi, Mohd. Waseem
    3RD NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2012), 2012,
  • [27] Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques
    Wahab, Osama Fouad Abdel
    Khalaf, Ashraf A. M.
    Hussein, Aziza I.
    Hamed, Hesham F. A.
    IEEE ACCESS, 2021, 9 : 31805 - 31815
  • [28] Security Model for Secure Transmission of Medical Image Data Using Steganography
    Umeda, Tokuo
    Okawa, Akiko
    Gomi, Tsutomu
    INTEGRATING INFORMATION TECHNOLOGY AND MANAGEMENT FOR QUALITY OF CARE, 2014, 202 : 311 - 311
  • [29] Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography
    Zhang, Xin
    Chen, Kejiang
    Ding, Jinyang
    Yang, Yuqi
    Zhang, Weiming
    Yu, Nenghai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3148 - 3163
  • [30] Secure QR-Code Based Message Sharing System Using Cryptography and Steganography
    Mendhe, Abhijeet
    Gupta, Deepak Kumar
    Sharma, Krishna Pal
    2018 FIRST INTERNATIONAL CONFERENCE ON SECURE CYBER COMPUTING AND COMMUNICATIONS (ICSCCC 2018), 2018, : 188 - 191