Downloads: 112 | Views: 248
Survey Paper | Electronics & Communication Engineering | India | Volume 3 Issue 4, April 2014 | Popularity: 6.6 / 10
A Survey on Cryptography and Steganography
Niveditha R
Abstract: Cryptography is an area, which is developed to provide security for the sender and receiver to transmit and receive confidential data through an insecure channel by a means of process called encryption / decryption. Cryptography ensures that the message should be sent without any alternation and only the authorized person can be able to open and read the message. A number of cryptographic techniques are developed for achieving secure communication. There are basically two techniques of cryptography symmetric and asymmetric steganography. Steganography can be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. The main objectives of steganography are undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. This paper includes the detailed survey on the steganography techniques and encryption algorithm with their merits and demerits.
Keywords: cryptography, steganography, encryption algorithm, steganographic techniques
Edition: Volume 3 Issue 4, April 2014
Pages: 398 - 402
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Review Papers, Electronics & Communication Engineering, India, Volume 11 Issue 12, December 2022
Pages: 143 - 144Blockchain Based Access Control System for Cloud Storage
Kamisetty Vinay
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Masters Thesis, Electronics & Communication Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1015 - 1019A High Performance Data Encryption and Masking Using AES Algorithm
Poornima TN, Dr. Somashekar K
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Electronics & Communication Engineering, India, Volume 11 Issue 4, April 2022
Pages: 1295 - 1299Implementation of Elliptic Curve Cryptography Processor for FPGA Applications
Ch. Venkateswarlu, Nirmala Teegala
Downloads: 101
Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016
Pages: 1054 - 1061Review on Methods of Authentication of Images with Data Repair Capability
Vrushali Chirmade, Dimple Chaudhari
Downloads: 102
Informative Article, Electronics & Communication Engineering, India, Volume 7 Issue 4, April 2018
Pages: 1774 - 1776An Enhanced Approach for Video Encryption using Multilayer and Scrambling through AES Algorithm
Vinay Kumar Soni, Prashant Puri Goswami