A Review of Combined Effect of Cryptography & Steganography Techniques to Secure the Information

被引:2
作者
Mustafa, Ghulam [1 ]
Ashraf, Rehan [1 ]
Ul Haq, Inam [2 ]
Khalid, Yusra [1 ]
Ul Islam, Rafiq [3 ]
机构
[1] Natl Text Univ, Dept Comp Sci, Faisalabad, Pakistan
[2] Univ Okara, Dept Comp Sci, Okara, Pakistan
[3] Beijing Inst Technol, Dept Comp Sci, Beijing, Peoples R China
来源
2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, ENGINEERING, AND DESIGN (ICCED) | 2019年
关键词
Security; Cryptography; Steganography; Ciphers; Encryption; Decryption;
D O I
10.1109/icced46541.2019.9161128
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the age of technology, the internet is the major component that is used to connect the whole world. The information or data that we share on the internet is not secure at all due to hackers and intruders. The prime attack on this information is a loss of confidential information or modification of this information that is called confidentiality and Integrity. Cryptography is used for secure communication over the internet in the presence of the intruder or hacker. Cryptography is a technique in which plain text converted into ciphertext in such a way that only particular receiver can understand it. In cryptography, the existence of ciphertext is known to the intruder or hacker. Whereas steganography is a technique in which message embedded into the cover image such that no one knows the existence of message except the sender and receiver. This paper provides a review of the combined effect of cryptography and steganography techniques to secure the information shared over the internet. The comparison of the combined cryptography and steganography techniques evaluated on the basis of some selected parameters like their encryption technique, key length, security, and data is hidden capacity.
引用
收藏
页数:6
相关论文
共 22 条
  • [1] Baby A., 2017, INT J ADV RES COMPUT, V8
  • [2] Bandyopadhyay S. K., 2008, UFL JIITU
  • [3] Chen Y., 2014, J VIS COMMUN IMAGE R, V25
  • [4] Divya A., 2016, INT J ADV SCI RES MA, V1, P8189
  • [5] Goel S., 2013, GLOB J COMPUT SCI TE, V13, P7
  • [6] Hussain M., 2018, SIGNAL PROCESS IMAGE
  • [7] I. Engineering, 2013, INT J ADV RES ELECT, V2
  • [8] Islam S. M. M., 2017, INT J COMPUT SCI MOB, V6, P2530
  • [9] Jain M., 2017, SG VIHAR U INT J ENV, V3, P2125
  • [10] Johnson T., 2016, INT J APPL ENG RES, V11