A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography

被引:12
作者
Varghese, Fredy [1 ,2 ]
Sasikala, P. [3 ]
机构
[1] Vinayaka Missions Kirupananda Variyar Engn Coll, Salem, Tamil Nadu, India
[2] Naipunnya Inst Management & Informat Technol, Dept Comp Sci, Trichur, Kerala, India
[3] Vinayaka Missions Kirupananda Variyar Engn Coll, Dept Math, Salem, Tamil Nadu, India
关键词
Security; Cryptography; Steganography; Advanced encryption standard (AES); Data hiding; DISCRETE WAVELET TRANSFORM; AUDIO STEGANOGRAPHY; IMAGE; ENCRYPTION; ALGORITHM;
D O I
10.1007/s11277-023-10183-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
During the last few decades, digital communication has played a vital role in various sectors such as healthcare departments, banking, information technology companies, industries, and other fields. Nowadays, all data are transmitted over the Internet, which needs high protection for transmitting the original data from source to destination. In order to secure digital communication, cryptography and steganography methods are used to achieve data security over insecure and open networks like the Internet. Cryptography is the method of encrypting secret information in an unreadable structure. Based on the cryptography method, the original message can be distorted before data transmission. On the other hand, steganography covers secret data such as audio, image, text, and video. It can hide the message while transmitting the original information from one end to another. The data combines images, texts, audio and videos, which are communicated worldwide through the Internet. This review paper gives an analysis based on the concept of cryptography and steganography. It also presents a comparative approach using several encryption algorithms with several factors such as block size, key size, encryption speed, memory usage, and security level.
引用
收藏
页码:2291 / 2318
页数:28
相关论文
共 50 条
  • [41] Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques
    Khari, Manju
    Garg, Aditya Kumar
    Gandomi, Amir H.
    Gupta, Rashmi
    Patan, Rizwan
    Balusamy, Balamurugan
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2020, 50 (01): : 73 - 80
  • [42] A safe and secured iris template using steganography and cryptography
    Oluwakemi Christiana Abikoye
    Umar Abdulraheem Ojo
    Joseph Bamidele Awotunde
    Roseline Oluwaseun Ogundokun
    Multimedia Tools and Applications, 2020, 79 : 23483 - 23506
  • [43] SEBS - Secure Emoticons Based Steganography
    Rafat, Khan Farhan
    Hussain, Junaid
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 280 - 287
  • [44] Cloud based secure multimedia medical data using optimized convolutional neural network and cryptography mechanism
    Swetha, Gadde
    Janaki, Karur
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (23) : 33971 - 34007
  • [45] Review on lightweight cryptography techniques and steganography techniques for IoT environment
    Supriya, K. Sangeetha
    Lovesum, S. P. Jeno
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (09) : 4210 - 4228
  • [46] Data hiding on web using combination of Steganography and Cryptography
    Kothari, Lipi
    Thakkar, Rikin
    Khara, Satvik
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 448 - 452
  • [47] Secure Data Transmission Scheme Based on Elliptic Curve Cryptography for Internet of Things
    Harbi, Yasmine
    Aliouat, Zibouda
    Harous, Saad
    Bentaleb, Abdelhak
    MODELLING AND IMPLEMENTATION OF COMPLEX SYSTEMS, 2019, 64 : 34 - 46
  • [48] A safe and secured iris template using steganography and cryptography
    Abikoye, Oluwakemi Christiana
    Ojo, Umar Abdulraheem
    Awotunde, Joseph Bamidele
    Ogundokun, Roseline Oluwaseun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (31-32) : 23483 - 23506
  • [49] Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography
    Pandey, Hari Mohan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 (111): : 213 - 225
  • [50] A New Approach for Data Security in Cryptography and Steganography
    Guttikonda, Prashanti
    Kaviti, Sandhya Rani
    Popuri, Ashok Kumar
    COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 35 - 44