Call for Paper - April 2020 Edition
IJCA solicits original research papers for the April 2020 Edition. Last date of manuscript submission is March 20, 2020. Read More

Cryptography and Steganography for Information Hiding

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Mihir Wagle, Pavan Chhatpar

Mihir Wagle and Pavan Chhatpar. Cryptography and Steganography for Information Hiding. International Journal of Computer Applications 175(7):33-35, October 2017. BibTeX

	author = {Mihir Wagle and Pavan Chhatpar},
	title = {Cryptography and Steganography for Information Hiding},
	journal = {International Journal of Computer Applications},
	issue_date = {October 2017},
	volume = {175},
	number = {7},
	month = {Oct},
	year = {2017},
	issn = {0975-8887},
	pages = {33-35},
	numpages = {3},
	url = {},
	doi = {10.5120/ijca2017915607},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Due to rapid advances in consumer computing, most data is stored electronically, without any physical copy. Thus, securing this data has become an important issue to consider. Steganography allows us to hide information within other information or digital media to prevent snooping. Cryptography encrypts the information so that snoopers cannot decipher it with ease. If information hiding employs cryptography, followed by steganography, then even if a third party guesses you have used steganography, it is unable to gain access to the information with ease.


  1. Chandramouli, Rajarathnam, and Nasir Memon. ”Analysis of LSB based image steganography techniques.” Image Processing, 2001. Proceedings. 2001 International Conference on. Vol. 3. IEEE, 2001.
  2. Weiqi Luo, Member, IEEE, Fangjun Huang, Member, IEEE, and Jiwu Huang, Senior Member, IEEE “Edge Adaptive Image Steganography Based on LSB Matching Revisited” IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, June 2010.
  3. Desai, Hardikkumar V. ”Steganography, cryptography, watermarking: a comparative  study.”  Journal  of  Global  Research  in  Computer  Science 3.12 (2012): 33-35.
  4. Hussain, Mehdi, and Mureed Hussain. ”A survey of image steganography techniques.” (2013).
  5. Tadayoshi Kohno∗ “Analysis of the WinZip encryption method” IACR ePrint Archive 2004/07.


steganography, cryptography, security, digital signal processing