A Review on Steganography & Cryptography Techniques

Abstract

There is a need for more secure methods for transferring data between source to destination due to increase in the number of attack recorded during electronic exchange Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. These two techniques share the common goals and services of protecting the confidentiality, integrity and availability of information from unauthorized access. In this paper, information security and data hiding system that is based on steganography and cryptography is proposed to secure data transfer between the source and destination. A LSB (Least Significant Bit) method is the easiest way of hiding information in an image and yet it is effective.

Authors and Affiliations

Vijay Prakash, Aakash Gupta

Keywords

Related Articles

A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering

Efficient file query is important to the overall performance of peer-to-peer (P2P) file sharing systems. Clustering peers by their common interests can significantly enhance the efficiency of file query. Clustering peer...

Review of Custom Made Implant

The last twenty years have seen an increase in research activities and technological development in orthopedic, implants and biomedical field. The main purpose of this review is formulating an integration of technologie...

Architecture of Windows NT Operating System

The architecture of Windows NT, a line of operating systems produced and sold by Microsoft, is a layered design that consists of two main components, user mode and kernel mode. It is a preemptive, reentrant operating sy...

Noise Pollution Analysis during Chhath Puja in Gorakhpur City

Noise pollution beyond a level is harmful. Recently noise pollution has been well recognized as one of the major trepidations that impact the quality of life in urban areas across the globe. The present work, shares the...

A Robust But Flexible Privacy Preserving Scheme Supporting Cloud Environments

Fog is the Ruby cloud services library. The fog binary allows quick and easy access to configured cloud services. Whether you need compute, storage, or a multitude of other services, fog provides an accessible entry poi...

Download PDF file
  • EP ID EP24031
  • DOI -
  • Views 312
  • Downloads 8

How To Cite

Vijay Prakash, Aakash Gupta (2017). A Review on Steganography & Cryptography Techniques. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://europub.co.uk./articles/-A-24031