A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography

被引:12
作者
Varghese, Fredy [1 ,2 ]
Sasikala, P. [3 ]
机构
[1] Vinayaka Missions Kirupananda Variyar Engn Coll, Salem, Tamil Nadu, India
[2] Naipunnya Inst Management & Informat Technol, Dept Comp Sci, Trichur, Kerala, India
[3] Vinayaka Missions Kirupananda Variyar Engn Coll, Dept Math, Salem, Tamil Nadu, India
关键词
Security; Cryptography; Steganography; Advanced encryption standard (AES); Data hiding; DISCRETE WAVELET TRANSFORM; AUDIO STEGANOGRAPHY; IMAGE; ENCRYPTION; ALGORITHM;
D O I
10.1007/s11277-023-10183-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
During the last few decades, digital communication has played a vital role in various sectors such as healthcare departments, banking, information technology companies, industries, and other fields. Nowadays, all data are transmitted over the Internet, which needs high protection for transmitting the original data from source to destination. In order to secure digital communication, cryptography and steganography methods are used to achieve data security over insecure and open networks like the Internet. Cryptography is the method of encrypting secret information in an unreadable structure. Based on the cryptography method, the original message can be distorted before data transmission. On the other hand, steganography covers secret data such as audio, image, text, and video. It can hide the message while transmitting the original information from one end to another. The data combines images, texts, audio and videos, which are communicated worldwide through the Internet. This review paper gives an analysis based on the concept of cryptography and steganography. It also presents a comparative approach using several encryption algorithms with several factors such as block size, key size, encryption speed, memory usage, and security level.
引用
收藏
页码:2291 / 2318
页数:28
相关论文
共 50 条
  • [31] A Review on Steganography and Cryptography
    Mishra, Rina
    Bhanodiya, Praveen
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 119 - 122
  • [32] Data Security Using Cryptography and Steganography Techniques
    Saleh, Marwa E.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 390 - 397
  • [33] A Survey on DNA-Based Cryptography and Steganography
    Mahjabin, Tasnuva
    Olteanu, Alina
    Xiao, Yang
    Han, Wenlin
    Li, Tieshan
    Sun, Wei
    IEEE ACCESS, 2023, 11 : 116423 - 116451
  • [34] Secure non real time image encryption algorithm development using cryptography & Steganography
    Mukhedkar, Moresh
    Powar, Prajkta
    Gaikwad, Peter
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [35] Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography
    B. Prasanalakshmi
    K. Murugan
    Karthik Srinivasan
    S. Shridevi
    Shermin Shamsudheen
    Yu-Chen Hu
    The Journal of Supercomputing, 2022, 78 : 361 - 378
  • [36] Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography
    Prasanalakshmi, B.
    Murugan, K.
    Srinivasan, Karthik
    Shridevi, S.
    Shamsudheen, Shermin
    Hu, Yu-Chen
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (01) : 361 - 378
  • [37] Secret information hiding in image randomly method using steganography and cryptography
    Hammoud, Awad Kadhim
    Mohaisen, Hatem Nahi
    Mohammed, Mohammed Q.
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 : 1283 - 1291
  • [38] Dual Steganography Approach for Secure Data Communication
    Sakthisudhan, K.
    Prabhu, P.
    Thangaraj, P.
    Marimuthu, C. M.
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 412 - 417
  • [39] A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure
    Namasudra, Suyel
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [40] Secure Data Transfer in IoT environment: adopting both Cryptography and Steganography techniques
    Das, Ria
    Das, Indrajit
    2016 SECOND IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), 2016, : 296 - 301