A Review on Steganography & Cryptography Techniques

Abstract

There is a need for more secure methods for transferring data between source to destination due to increase in the number of attack recorded during electronic exchange Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. These two techniques share the common goals and services of protecting the confidentiality, integrity and availability of information from unauthorized access. In this paper, information security and data hiding system that is based on steganography and cryptography is proposed to secure data transfer between the source and destination. A LSB (Least Significant Bit) method is the easiest way of hiding information in an image and yet it is effective.

Authors and Affiliations

Vijay Prakash, Aakash Gupta

Keywords

Related Articles

Design, Modification and Analysis of Shaft of Concrete Mixer Machine

In this project Design, Modification and Analysis of shaft of concrete mixer machine has done. Shaft is an important equipment of concrete mixer machine use for concrete mixture preparation and for support a revolving d...

Experimental Investigation and Free Vibration Analysis of Hybrid Laminated Composite Beam Using Finite Element Method

The present study aims at learning the mechanical behavior of Hybrid Synthetic fiber composites. The laminated composite beams are basic structural components used in a variety of engineering structures such as airplane...

Mechanical Properties of Waste Plastic Reinforced Epoxy Matrix Composites

Management and treatment of plastic waste can mitigate adverse impacts on environment process and human health. The aim of the present study was to develop and characterise polymeric composite waste plastic pellets by m...

Ethno-medicinal Survey of North Kashmir with Special Reference to Bandipora

Bandipora district is one of the 22 districts in Jammu and Kashmir State. The local people of the district have always used medicinal plants for the treatment of various ailments by traditional methods. Utilization of m...

Android based Advance Anti-Theft Security System

Security is a complicated system in our day-to-day life. Everyone wants to be as more secure as possible. We know our home or shop is protected provides us peace of mind. Theft has become major issue now a day’s. So we...

Download PDF file
  • EP ID EP24031
  • DOI -
  • Views 283
  • Downloads 8

How To Cite

Vijay Prakash, Aakash Gupta (2017). A Review on Steganography & Cryptography Techniques. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://europub.co.uk/articles/-A-24031