Stegocrypto - A Review Of Steganography Techniques Using Cryptography
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 4
Abstract
The information security has become essential part of today’s world due to extensive use of internet. The privacy of secret data can be achieved with two classical methods of data security namely Cryptography and Steganography.Cryptography results in scrambling of data into cipher text which is in unreadable or in nonexplainatory form, difficult to be guessed by eavesdropper, Steganography on the other hand hides the secret data into carrier medium in such a way that its detection is prevented.Steganography is not a replacement of cryptography but can supplement it to produce good results. It is observed that steganography alone is not sufficient for information security, so we can make more secure and robust approach by combining the best of steganography and cryptography. This paper describes the various steganographic techniques combined with cryptography.
Authors and Affiliations
Vipula Madhukar Wajgade , Dr. Suresh Kumar
ATTACKS ON SECURITY PROTOCOLS USING AVISPA
Now a days, Use of Internet is increased day by day. Both Technical and non technical people use the Internet very frequently but only technical user can understand the aspects working behind Internet. There are differen...
How Accountability Improves Software Reliability?
This paper encourage accountability as a principle for software reliability. There are various techniques to estimate software reliability which is tested. This paper treats to identify the faults which are put in the de...
Using Queuing theory the performance measures of cloud with infinite servers
Cloud computing has got enormous popularity as it offers dynamic, low-cost computing solutions. To get the service of cloud the user has to be in queue until he is served. Each arriving Cloud computing User (CCU) request...
Exploratory Data Analysis of Turbulent Flows
Large Eddy Simulations (LES) contains 3D instantaneous velocity fields as well as passive scalar concentration field describing the coherent flow structures. The study of coherent flow structures has a major impact on th...
COMPREHENSIVE STUDY AND COMPARISON OF INFORMATION DISPERSAL TECHNIQUES FOR CLOUD COMPUTING
Cloud systems refer to the collection of interconnected servers that are provisioned dynamically on demand, for execution of applications, to the customer like electricity grid. Cloud computing has gained great attention...