Stegocrypto - A Review Of Steganography Techniques Using Cryptography

Abstract

The information security has become essential part of today’s world due to extensive use of internet. The privacy of secret data can be achieved with two classical methods of data security namely Cryptography and Steganography.Cryptography results in scrambling of data into cipher text which is in unreadable or in nonexplainatory form, difficult to be guessed by eavesdropper, Steganography on the other hand hides the secret data into carrier medium in such a way that its detection is  prevented.Steganography is not a replacement of cryptography but can supplement it to produce good results. It is observed that steganography alone is not sufficient for information security, so we can make more secure and robust approach by combining the best of steganography and cryptography. This paper describes the various steganographic techniques combined with cryptography.

Authors and Affiliations

Vipula Madhukar Wajgade , Dr. Suresh Kumar

Keywords

Related Articles

ATTACKS ON SECURITY PROTOCOLS USING AVISPA

Now a days, Use of Internet is increased day by day. Both Technical and non technical people use the Internet very frequently but only technical user can understand the aspects working behind Internet. There are differen...

How Accountability Improves Software Reliability?

This paper encourage accountability as a principle for software reliability. There are various techniques to estimate software reliability which is tested. This paper treats to identify the faults which are put in the de...

Using Queuing theory the performance measures of cloud with infinite servers

Cloud computing has got enormous popularity as it offers dynamic, low-cost computing solutions. To get the service of cloud the user has to be in queue until he is served. Each arriving Cloud computing User (CCU) request...

Exploratory Data Analysis of Turbulent Flows

Large Eddy Simulations (LES) contains 3D instantaneous velocity fields as well as passive scalar concentration field describing the coherent flow structures. The study of coherent flow structures has a major impact on th...

COMPREHENSIVE STUDY AND COMPARISON OF INFORMATION DISPERSAL TECHNIQUES FOR CLOUD COMPUTING

Cloud systems refer to the collection of interconnected servers that are provisioned dynamically on demand, for execution of applications, to the customer like electricity grid. Cloud computing has gained great attention...

Download PDF file
  • EP ID EP114872
  • DOI -
  • Views 105
  • Downloads 0

How To Cite

Vipula Madhukar Wajgade, Dr. Suresh Kumar (2013). Stegocrypto - A Review Of Steganography Techniques Using Cryptography. International Journal of Computer Science & Engineering Technology, 4(4), 423-426. https://europub.co.uk/articles/-A-114872