Full Paper View Go Back

Information Security: A Review on Steganography with Cryptography for Secured Data Transaction

Kodge B. G.1

1 Department of Computer Science, Swami Vivekanand Mahavidhyalaya, Udgir, India.

Correspondence should be addressed to: kodgebg@gmail.com.


Section:Research Paper, Product Type: Journal
Vol.5 , Issue.6 , pp.1-4, Dec-2017


CrossRef-DOI:   https://doi.org/10.26438/ijsrnsc/v5i6.14


Online published on Dec 31, 2017


Copyright © Kodge B. G. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kodge B. G., “Information Security: A Review on Steganography with Cryptography for Secured Data Transaction,” International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.1-4, 2017.

MLA Style Citation: Kodge B. G. "Information Security: A Review on Steganography with Cryptography for Secured Data Transaction." International Journal of Scientific Research in Network Security and Communication 5.6 (2017): 1-4.

APA Style Citation: Kodge B. G., (2017). Information Security: A Review on Steganography with Cryptography for Secured Data Transaction. International Journal of Scientific Research in Network Security and Communication, 5(6), 1-4.

BibTex Style Citation:
@article{G._2017,
author = {Kodge B. G.},
title = {Information Security: A Review on Steganography with Cryptography for Secured Data Transaction},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {12 2017},
volume = {5},
Issue = {6},
month = {12},
year = {2017},
issn = {2347-2693},
pages = {1-4},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=307},
doi = {https://doi.org/10.26438/ijcse/v5i6.14}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i6.14}
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=307
TI - Information Security: A Review on Steganography with Cryptography for Secured Data Transaction
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Kodge B. G.
PY - 2017
DA - 2017/12/31
PB - IJCSE, Indore, INDIA
SP - 1-4
IS - 6
VL - 5
SN - 2347-2693
ER -

1010 Views    584 Downloads    486 Downloads
  
  

Abstract :
This is an age of universal electronic connectivity & due to advanced hackers and crackers, the importance of security increases day by day. To protect the data from hackers and crackers, we prepared a very simple technique which avoids hacking of secret data. In this paper, we used two methods of encryption technique like- 1. Cryptography - converts plain text into coded form 2. Steganography- hides secret data into images. If we use each technique individually then there may be possibilities of decoding of data within some time limit. So, to avoid this and to provide powerful security, we combined both above mentioned techniques to encrypt and hide text data into the bits of bitmap image for secured data transaction.

Key-Words / Index Term :
Steganography, Cryptography, Image Processing, Information Security

References :
[1] A. Joseph Raphael, Dr. V Sundaram, International Journal of Computer Technology and Applications, Vol 2 (3), ISSN: 2229-6093, pp-626-630
[2] Emil Wolf, Progress in Optics, Vol. 60, Elsevier, 2015, pp-139.
[3] Cryptography and Network Security, forth edition, by William Stallings.
[4] WAYN96 Wayner, P. Disappearing Cryptography, Boston: AP Professional Books, 1996.
[5] Cryptography and Network Security, Principles and practices, second edition, by William Stallings.
[6] The article licensed under the “Code Project Open License” (COPL) by Corinna John.
[7] Digital Electronics by R. P. Jain, BPB Publications.
[8] Domenico Bloisi and Luca Iocchi, IMAGE BASED STEGANOGRAPHY AND CRYPTOGRAPHY, Dipartimento di Informatica e Sistemistica Sapienza University of Rome, Italy.
[9] M. Arora, S. Sharma, "Synthesis of Cryptography and Security Attacks", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.5, pp.1-5, 2017.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation