Downloads: 114 | Views: 266
Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.8 / 10
Survey on Information Hiding Using Image Based Steganography and Cryptography
Priyanka Mehta, Jignesh Vania
Abstract: Nowadays, the Internet is an indepensable communication channel of today's life. In wide systems, information should be transferred via safe communication channels including data security, copyright safety, human privacy, etc. Some potential problems, however, have resulted from the improving Internet, such as the copy and corruption of digital information. Therefore, the information security is considered as one immediate topic. Technologies for information and communication security have brought forth powerful tools to make this vision come true, despite many different kinds of adverse circumstances. Cryptography and steganography are the most widely used techniques to defeat this threat. Cryptography involves converting a message text into a scribbled cipher. On the other hand, steganography embeds message into a cover media and hides its existence. Both the techniques provide some security of data, neither of them is individually secure enough for sharing information over an unsecure communication channel and are vulnerable to intruder attacks. Many techniques came into existence to hide message securely in different types of cover media like video, audio and also images.
Keywords: steganography, cryptography, RSA encryption, canny edge detector, LSB
Edition: Volume 3 Issue 12, December 2014
Pages: 1584 - 1590
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2001
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 718
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 698
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 687
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera