International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 248

Survey Paper | Electronics & Communication Engineering | India | Volume 3 Issue 4, April 2014 | Popularity: 6.6 / 10


     

A Survey on Cryptography and Steganography

Niveditha R


Abstract: Cryptography is an area, which is developed to provide security for the sender and receiver to transmit and receive confidential data through an insecure channel by a means of process called encryption / decryption. Cryptography ensures that the message should be sent without any alternation and only the authorized person can be able to open and read the message. A number of cryptographic techniques are developed for achieving secure communication. There are basically two techniques of cryptography symmetric and asymmetric steganography. Steganography can be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. The main objectives of steganography are undetectability, robustness (resistance to various image processing methods and compression) and capacity of the hidden data. This paper includes the detailed survey on the steganography techniques and encryption algorithm with their merits and demerits.


Keywords: cryptography, steganography, encryption algorithm, steganographic techniques


Edition: Volume 3 Issue 4, April 2014


Pages: 398 - 402



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Niveditha R, "A Survey on Cryptography and Steganography", International Journal of Science and Research (IJSR), Volume 3 Issue 4, April 2014, pp. 398-402, https://www.ijsr.net/getabstract.php?paperid=20131455, DOI: https://www.doi.org/10.21275/20131455



Similar Articles

Downloads: 0

Review Papers, Electronics & Communication Engineering, India, Volume 11 Issue 12, December 2022

Pages: 143 - 144

Blockchain Based Access Control System for Cloud Storage

Kamisetty Vinay

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Masters Thesis, Electronics & Communication Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1015 - 1019

A High Performance Data Encryption and Masking Using AES Algorithm

Poornima TN, Dr. Somashekar K

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Electronics & Communication Engineering, India, Volume 11 Issue 4, April 2022

Pages: 1295 - 1299

Implementation of Elliptic Curve Cryptography Processor for FPGA Applications

Ch. Venkateswarlu, Nirmala Teegala

Share this Article

Downloads: 101

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari

Share this Article

Downloads: 102

Informative Article, Electronics & Communication Engineering, India, Volume 7 Issue 4, April 2018

Pages: 1774 - 1776

An Enhanced Approach for Video Encryption using Multilayer and Scrambling through AES Algorithm

Vinay Kumar Soni, Prashant Puri Goswami

Share this Article
Top