A Crypto-Steganography: A Survey

Abstract

The two important aspects of security that deal with transmitting information or data over some medium like Internet are steganography and cryptography. Steganography deals with hiding the presence of a message and cryptography deals with hiding the contents of a message. Both of them are used to ensure security. But none of them can simply fulfill the basic requirements of security i.e. the features such as robustness, undetectability and capacity etc. So a new method based on the combination of both cryptography and steganography known as Crypto-Steganography which overcome each other’s weaknesses and make difficult for the intruders to attack or steal sensitive information is being proposed. This paper also describes the basics concepts of steganography and cryptography on the basis of previous literatures available on the topic.

Authors and Affiliations

Md. Khalid Rahmani, Kamiya Arora, Naina Pal

Keywords

Related Articles

A Review of Computation Solutions by Mobile Agents in an Unsafe Environment

Exploration in an unsafe environment is one of the major problems that can be seen as a basic block for many distributed mobile protocols. In such environment we consider that either the nodes (hosts) or the agents can p...

The Impact of Knowledge Management on Organizational Performance

In today’s business, knowledge is considered as a core asset in any organization, even it can be considered as important as technological capital. It is part of human abilities and thus human capital. Knowledge managemen...

Survey on Human Activity Recognition based on Acceleration Data

Human activity recognition is an important area of machine learning research as it has many utilization in different areas such as sports training, security, entertainment, ambient-assisted living, and health monitoring...

Passive Clustering for Efficient Energy Conservation in Wireless Sensor Network

A wireless sensor network is a set of miniature nodes that consume little energy and route information to a base station. It will enable reliable monitoring of a wide variety of phenomena for civilian, military and medic...

Evaluation of OLSR Protocol Implementations using Analytical Hierarchical Process (AHP)

Adhoc networks are part of IEEE 802.11 Wireless LAN Standard also called Independent Basic Service Set (IBSS) and work as Peer to Peer network by default. These work without the requirement of an Infrastructure (such as...

Download PDF file
  • EP ID EP105220
  • DOI 10.14569/IJACSA.2014.050722
  • Views 149
  • Downloads 0

How To Cite

Md. Khalid Rahmani, Kamiya Arora, Naina Pal (2014). A Crypto-Steganography: A Survey. International Journal of Advanced Computer Science & Applications, 5(7), 149-155. https://europub.co.uk/articles/-A-105220