A Review on Steganography & Cryptography Techniques

Abstract

There is a need for more secure methods for transferring data between source to destination due to increase in the number of attack recorded during electronic exchange Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. These two techniques share the common goals and services of protecting the confidentiality, integrity and availability of information from unauthorized access. In this paper, information security and data hiding system that is based on steganography and cryptography is proposed to secure data transfer between the source and destination. A LSB (Least Significant Bit) method is the easiest way of hiding information in an image and yet it is effective.

Authors and Affiliations

Vijay Prakash, Aakash Gupta

Keywords

Related Articles

Student And Invigilator Authentication Through Mobile Application

In present day the management of examination is done manually. The main problem with manual system is it takes more effort and physical space to keep track of paper documents like hall tickets, to find information and t...

Mathematical Modelling Of Blood Flow through Three Layered Stenosed Artry

A three layer mathematical model is presented to study the blood flow characteristics using blood fluid as casson’s and bingham plastic fluid model. The important characteristics of blood flow such as velocity profile,...

Assessment of Groundwater potential zone using remote sensing and GIS in Varahanadhi watershed, Tamilnadu, India

Groundwater is an important natural resource for its use in domestic, agriculture, and industries purposes. There has been a tremendous increase in the demand for groundwater due to increase in population, advanced irri...

Design and Development of GUI for Magnetic Suspension Reaction Wheel

This paper focuses on the design and development of a Graphical User Interface system (GUI) for the performance analysis of the Magnetic Suspension Reaction Wheel (MSRW) with four degrees of freedom. The GUI development...

A Novel Symmetrical Cascade H-Bridge MultiLevel Inverter Topology with Reduced Switching Devices

This paper proposes a new structure for cascade h bridge (CHB) based modular multi-level voltage source inverter. As with the correct arrangement of power semiconductor switches and voltage sources, the proposed inverte...

Download PDF file
  • EP ID EP24031
  • DOI -
  • Views 310
  • Downloads 8

How To Cite

Vijay Prakash, Aakash Gupta (2017). A Review on Steganography & Cryptography Techniques. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://europub.co.uk/articles/-A-24031