Collaboration of Cryptography and Steganography for Enhanced Security: A REVIEW

  • Swati Nagpal Department of Computer Science and Engineering Guru Jambheshwar University of Science & Technology, Hisar, Haryana, India
  • Ritu Nagpal Department of Computer Science and Engineering Guru Jambheshwar University of Science & Technology
Keywords: Cryptography, Steganography, LSB, AES.

Abstract

Today most of the communication takes place through web and people are using internet for every day communication. Because of the large advancements in Internet Technology the indispensable need of security for protection of data from the assorted hackers also rises. Cryptography and Steganography both are widely used techniques for secured data transmission. Where Cryptography is a technique which distorts a message and Steganography hides the message/data. For Encryption of secret message we will use AES and then image will be embedded using LSB algorithm which carries our confidential data. The amalgamation of both AES and LSB algorithms will take place to grant Security with confidentiality during communication of the secret data. The main objective of the paper is to assign security levels in the secret data which needs to be converse through the cover image. From the review of literature it is found that there is need to offer confidentiality to the secret message/data by merging the Cryptographic Techniques in Steganography. 

References

[1] Sujay Narayana and Gaurav Prasad, “Two New Approaches for Secured Image Steganography using Cryptographic Techniques and Type Conversions”, Su Signal& Image Processing : An International Journal (SIPIJ ), Volume1, No.2, December 2010.
[2] Arvind Kumar, Km. Pooja, “Steganography-A Data Hiding Technique”, International Journal of Computer Applications, Volume 9 No.7, November 2010.
[3] Epuru Madhavarao, ChikkalaJayaRaju, Pedasanaganti Divya, A.S.K.Ratnam, “Data Security using Cryptography and Steganography”, International Journal of Advanced Research in Computer Engineering & Technology, Volume 1, Issue 5, July 2012.
[4] Septimiu Fabian Mare, Mircea Vladutiu and Lucian Prodan, “Secret data communication system using Steganography, AES and RSA”, IEEE 17th International Symposium for Design and Technology in Electronic Packaging (SIITME), 2011.
[5] Sarita Nain, Sunil Kumar, “Steganography and Its Various Techniques”, International journal of Enhanced Research in Science Technology & Engineering, ISSN: 2319-7463, Volume 3, Issue 6, pp.(241-245), June-2014.
[6] Darshana Patil, Prof. P. M. Chawan, “A Secure Data Communication System Using Enhanced Cryptography and Steganography”, International Journal Innovative Research in Computer and Communication Engineering (An ISO 3297:2007 Certified Organization), Volume 5, Issue 6, June 2017.
[7] Surekha Shrivastava, Mr. Gajendra Singh Chandel, Mr. Kailash Patidar, “A Modified Approach Audio Steganography Based on Technique LSB Coding”, International Journal of Engineering and Applied Sciences(IJEAS) ISSN:2394-3661, Volume 2,Issue 5, May 2015.
[8] Giridhar Maji, Sharmistha Mandal, Soumya Sen, Narayan C. Debnath,” Dual Image based LSB Steganography”, IEEE 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom) ,2018 .
[9] Gandharba Swain and Saroj Kumar Lenka,” LSB Array Based Image Steganography Technique by Exploring the Four Least Significant Bits”, Springer-Verlag Berlin Heidelberg, pp. 479–488, 2012.
[10] Mamta Juneja and Parvinder Singh Sandhu,” A New Approach for Information security using an Improved Steganography Technique”, Journal of Info.Pro.Systems, Volume 9, No 3, pp. 405-424, 2013.
[11]Nagham Hamid, AbidYahya, R. Badlishah Ahmad & OsamahM. Al-Qershi, “Image Steganography Techniques: An Overview”, International Journal of Computer Science and Security (IJCSS), Volume 6, Issue 3, 2012.
[12] Suchi Goyal, Manoj Ramaiya, Deepika Dubey,”Improved Detection of 1-2-4 LSB Steganography and RSA Cryptography in Color and Grayscale Images”, IEEE International Conference on Computational Intelligence and Communication Networks, 2015.
[13] A.Joseph Raphael &Dr. V. Sundaram,” Cryptography and Steganography- A Survey”, International Journal of Computer Technology and Applications, Volume 2, pp. 626-630,2014.
[14] Mohammad Ali Bani Younesand Aman Jantan , “A New Steganography approach for Image Encryption Exchange by Using the Least Significant Bit Insertion”, IJCSNS International Journal of Computer Science and Network Security, Volume 8 No.6, June 2008.
Published
2018-08-22
Section
Articles