Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

Cryptography and Steganography for Information Hiding

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Mihir Wagle, Pavan Chhatpar
10.5120/ijca2017915607

Mihir Wagle and Pavan Chhatpar. Cryptography and Steganography for Information Hiding. International Journal of Computer Applications 175(7):33-35, October 2017. BibTeX

@article{10.5120/ijca2017915607,
	author = {Mihir Wagle and Pavan Chhatpar},
	title = {Cryptography and Steganography for Information Hiding},
	journal = {International Journal of Computer Applications},
	issue_date = {October 2017},
	volume = {175},
	number = {7},
	month = {Oct},
	year = {2017},
	issn = {0975-8887},
	pages = {33-35},
	numpages = {3},
	url = {http://www.ijcaonline.org/archives/volume175/number7/28502-2017915607},
	doi = {10.5120/ijca2017915607},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Due to rapid advances in consumer computing, most data is stored electronically, without any physical copy. Thus, securing this data has become an important issue to consider. Steganography allows us to hide information within other information or digital media to prevent snooping. Cryptography encrypts the information so that snoopers cannot decipher it with ease. If information hiding employs cryptography, followed by steganography, then even if a third party guesses you have used steganography, it is unable to gain access to the information with ease.

References

  1. Chandramouli, Rajarathnam, and Nasir Memon. ”Analysis of LSB based image steganography techniques.” Image Processing, 2001. Proceedings. 2001 International Conference on. Vol. 3. IEEE, 2001.
  2. Weiqi Luo, Member, IEEE, Fangjun Huang, Member, IEEE, and Jiwu Huang, Senior Member, IEEE “Edge Adaptive Image Steganography Based on LSB Matching Revisited” IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, June 2010.
  3. Desai, Hardikkumar V. ”Steganography, cryptography, watermarking: a comparative  study.”  Journal  of  Global  Research  in  Computer  Science 3.12 (2012): 33-35.
  4. Hussain, Mehdi, and Mureed Hussain. ”A survey of image steganography techniques.” (2013).
  5. Tadayoshi Kohno∗ “Analysis of the WinZip encryption method” IACR ePrint Archive 2004/07.

Keywords

steganography, cryptography, security, digital signal processing