CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Cryptography and Steganography for Information Hiding

by Mihir Wagle, Pavan Chhatpar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 7
Year of Publication: 2017
Authors: Mihir Wagle, Pavan Chhatpar
10.5120/ijca2017915607

Mihir Wagle, Pavan Chhatpar . Cryptography and Steganography for Information Hiding. International Journal of Computer Applications. 175, 7 ( Oct 2017), 33-35. DOI=10.5120/ijca2017915607

@article{ 10.5120/ijca2017915607,
author = { Mihir Wagle, Pavan Chhatpar },
title = { Cryptography and Steganography for Information Hiding },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2017 },
volume = { 175 },
number = { 7 },
month = { Oct },
year = { 2017 },
issn = { 0975-8887 },
pages = { 33-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number7/28502-2017915607/ },
doi = { 10.5120/ijca2017915607 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:24:27.623379+05:30
%A Mihir Wagle
%A Pavan Chhatpar
%T Cryptography and Steganography for Information Hiding
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 7
%P 33-35
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to rapid advances in consumer computing, most data is stored electronically, without any physical copy. Thus, securing this data has become an important issue to consider. Steganography allows us to hide information within other information or digital media to prevent snooping. Cryptography encrypts the information so that snoopers cannot decipher it with ease. If information hiding employs cryptography, followed by steganography, then even if a third party guesses you have used steganography, it is unable to gain access to the information with ease.

References
  1. Chandramouli, Rajarathnam, and Nasir Memon. ”Analysis of LSB based image steganography techniques.” Image Processing, 2001. Proceedings. 2001 International Conference on. Vol. 3. IEEE, 2001.
  2. Weiqi Luo, Member, IEEE, Fangjun Huang, Member, IEEE, and Jiwu Huang, Senior Member, IEEE “Edge Adaptive Image Steganography Based on LSB Matching Revisited” IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, June 2010.
  3. Desai, Hardikkumar V. ”Steganography, cryptography, watermarking: a comparative  study.”  Journal  of  Global  Research  in  Computer  Science 3.12 (2012): 33-35.
  4. Hussain, Mehdi, and Mureed Hussain. ”A survey of image steganography techniques.” (2013).
  5. Tadayoshi Kohno∗ “Analysis of the WinZip encryption method” IACR ePrint Archive 2004/07.
Index Terms

Computer Science
Information Sciences

Keywords

steganography cryptography security digital signal processing