Collaboration of Cryptography and Steganography for Enhanced Security: A REVIEW
Today most of the communication takes place through web and people are using internet for every day communication. Because of the large advancements in Internet Technology the indispensable need of security for protection of data from the assorted hackers also rises. Cryptography and Steganography both are widely used techniques for secured data transmission. Where Cryptography is a technique which distorts a message and Steganography hides the message/data. For Encryption of secret message we will use AES and then image will be embedded using LSB algorithm which carries our confidential data. The amalgamation of both AES and LSB algorithms will take place to grant Security with confidentiality during communication of the secret data. The main objective of the paper is to assign security levels in the secret data which needs to be converse through the cover image. From the review of literature it is found that there is need to offer confidentiality to the secret message/data by merging the Cryptographic Techniques in Steganography.
 Arvind Kumar, Km. Pooja, “Steganography-A Data Hiding Technique”, International Journal of Computer Applications, Volume 9 No.7, November 2010.
 Epuru Madhavarao, ChikkalaJayaRaju, Pedasanaganti Divya, A.S.K.Ratnam, “Data Security using Cryptography and Steganography”, International Journal of Advanced Research in Computer Engineering & Technology, Volume 1, Issue 5, July 2012.
 Septimiu Fabian Mare, Mircea Vladutiu and Lucian Prodan, “Secret data communication system using Steganography, AES and RSA”, IEEE 17th International Symposium for Design and Technology in Electronic Packaging (SIITME), 2011.
 Sarita Nain, Sunil Kumar, “Steganography and Its Various Techniques”, International journal of Enhanced Research in Science Technology & Engineering, ISSN: 2319-7463, Volume 3, Issue 6, pp.(241-245), June-2014.
 Darshana Patil, Prof. P. M. Chawan, “A Secure Data Communication System Using Enhanced Cryptography and Steganography”, International Journal Innovative Research in Computer and Communication Engineering (An ISO 3297:2007 Certified Organization), Volume 5, Issue 6, June 2017.
 Surekha Shrivastava, Mr. Gajendra Singh Chandel, Mr. Kailash Patidar, “A Modified Approach Audio Steganography Based on Technique LSB Coding”, International Journal of Engineering and Applied Sciences(IJEAS) ISSN:2394-3661, Volume 2,Issue 5, May 2015.
 Giridhar Maji, Sharmistha Mandal, Soumya Sen, Narayan C. Debnath,” Dual Image based LSB Steganography”, IEEE 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom) ,2018 .
 Gandharba Swain and Saroj Kumar Lenka,” LSB Array Based Image Steganography Technique by Exploring the Four Least Significant Bits”, Springer-Verlag Berlin Heidelberg, pp. 479–488, 2012.
 Mamta Juneja and Parvinder Singh Sandhu,” A New Approach for Information security using an Improved Steganography Technique”, Journal of Info.Pro.Systems, Volume 9, No 3, pp. 405-424, 2013.
Nagham Hamid, AbidYahya, R. Badlishah Ahmad & OsamahM. Al-Qershi, “Image Steganography Techniques: An Overview”, International Journal of Computer Science and Security (IJCSS), Volume 6, Issue 3, 2012.
 Suchi Goyal, Manoj Ramaiya, Deepika Dubey,”Improved Detection of 1-2-4 LSB Steganography and RSA Cryptography in Color and Grayscale Images”, IEEE International Conference on Computational Intelligence and Communication Networks, 2015.
 A.Joseph Raphael &Dr. V. Sundaram,” Cryptography and Steganography- A Survey”, International Journal of Computer Technology and Applications, Volume 2, pp. 626-630,2014.
 Mohammad Ali Bani Younesand Aman Jantan , “A New Steganography approach for Image Encryption Exchange by Using the Least Significant Bit Insertion”, IJCSNS International Journal of Computer Science and Network Security, Volume 8 No.6, June 2008.
Submission of an article implies that the work described has not been published previously (except in the form of an abstract or as part of a published lecture or academic thesis), that it is not under consideration for publication elsewhere, that its publication is approved by all authors and tacitly or explicitly by the responsible authorities where the work was carried out, and that, if accepted, will not be published elsewhere in the same form, in English or in any other language, without the written consent of the Publisher. The Editors reserve the right to edit or otherwise alter all contributions, but authors will receive proofs for approval before publication.
Copyrights for articles published in International Journal of Innovative Knowledge Concepts are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.