A Crypto-Steganography: A Survey

Abstract

The two important aspects of security that deal with transmitting information or data over some medium like Internet are steganography and cryptography. Steganography deals with hiding the presence of a message and cryptography deals with hiding the contents of a message. Both of them are used to ensure security. But none of them can simply fulfill the basic requirements of security i.e. the features such as robustness, undetectability and capacity etc. So a new method based on the combination of both cryptography and steganography known as Crypto-Steganography which overcome each other’s weaknesses and make difficult for the intruders to attack or steal sensitive information is being proposed. This paper also describes the basics concepts of steganography and cryptography on the basis of previous literatures available on the topic.

Authors and Affiliations

Md. Khalid Rahmani, Kamiya Arora, Naina Pal

Keywords

Related Articles

 A New Automatic Method to Adjust Parameters for Object Recognition

 To recognize an object in an image, the user must apply a combination of operators, where each operator has a set of parameters. These parameters must be “well” adjusted in order to reach good results. Usually, thi...

Impacts of Unbalanced Test Data on the Evaluation of Classification Methods

The performance of a classifier in a supervised machine learning problem is popularly evaluated by using the accuracy, precision, recall, and F1-score. These parameters could evaluate very well classifiers in the case th...

Evaluating Confidentiality Impact in Security Risk Scoring Models

Risk scoring models assume that confidentiality evaluation is based on user estimations. Confidentiality evaluation incorporates the impacts of various factors including systems' technical configuration, on the processes...

E-learning as a Research Area: An Analytical Approach 

 The concept of E-learning is very broad. It was coined in late 90s as the technological enhanced learning mechanism through Internet. Now it captures a broad range of electronic media like Internet, Intranets, Extr...

A Parallel Community Detection Algorithm for Big Social Networks

Mining social networks has become an important task in data mining field, which describes users and their roles and relationships in social networks. Processing social networks with graph algorithms is the source for dis...

Download PDF file
  • EP ID EP105220
  • DOI 10.14569/IJACSA.2014.050722
  • Views 159
  • Downloads 0

How To Cite

Md. Khalid Rahmani, Kamiya Arora, Naina Pal (2014). A Crypto-Steganography: A Survey. International Journal of Advanced Computer Science & Applications, 5(7), 149-155. https://europub.co.uk/articles/-A-105220