A Crypto-Steganography: A Survey

Abstract

The two important aspects of security that deal with transmitting information or data over some medium like Internet are steganography and cryptography. Steganography deals with hiding the presence of a message and cryptography deals with hiding the contents of a message. Both of them are used to ensure security. But none of them can simply fulfill the basic requirements of security i.e. the features such as robustness, undetectability and capacity etc. So a new method based on the combination of both cryptography and steganography known as Crypto-Steganography which overcome each other’s weaknesses and make difficult for the intruders to attack or steal sensitive information is being proposed. This paper also describes the basics concepts of steganography and cryptography on the basis of previous literatures available on the topic.

Authors and Affiliations

Md. Khalid Rahmani, Kamiya Arora, Naina Pal

Keywords

Related Articles

Self-organized Population Segmentation for Geosocial Network Neighborhood

Geosocial network neighborhood application allows user to share information and communicate with other people within a virtual neighborhood or community. A large and crowded neighbourhood will degrade social quality with...

Framework for Assessing Privacy of Internet Applications

This paper presents a new framework for assessing and documenting the privacy risks associated with developing and managing internet applications. The Framework for Assessing Privacy of Internet Applications (FAPIA) prov...

The Fundamentals of Unimodal Palmprint Authentication based on a Biometric System: A Review

Biometric system can be defined as the automated method of identifying or authenticating the identity of a living person based on physiological or behavioral traits. Palmprint biometric-based authentication has gained co...

An Analysis of Information Technology on Data Processing by using Cobit Framework

Information technology and processes is inter connected, directing and controlling the company in achieving corporate goals through value-added and balancing the risks and benefits of information technology. This study i...

An Extension of the Bisection Theorem to Symmetrical Circuits with Cross-Coupling

This paper demonstrates that the bisection theorem can be applied to the differential and common-mode analysis of balanced symmetrical circuits with cross coupling. This class of circuits is often found in the literature...

Download PDF file
  • EP ID EP105220
  • DOI 10.14569/IJACSA.2014.050722
  • Views 132
  • Downloads 0

How To Cite

Md. Khalid Rahmani, Kamiya Arora, Naina Pal (2014). A Crypto-Steganography: A Survey. International Journal of Advanced Computer Science & Applications, 5(7), 149-155. https://europub.co.uk/articles/-A-105220