Information Security: A Review on Steganography with Cryptography for Secured Data Transaction
Keywords:
Steganography, Cryptography, Image Processing, Information SecurityAbstract
This is an age of universal electronic connectivity & due to advanced hackers and crackers, the importance of security increases day by day. To protect the data from hackers and crackers, we prepared a very simple technique which avoids hacking of secret data. In this paper, we used two methods of encryption technique like- 1. Cryptography - converts plain text into coded form 2. Steganography- hides secret data into images. If we use each technique individually then there may be possibilities of decoding of data within some time limit. So, to avoid this and to provide powerful security, we combined both above mentioned techniques to encrypt and hide text data into the bits of bitmap image for secured data transaction.
References
A. Joseph Raphael, Dr. V Sundaram, International Journal of Computer Technology and Applications, Vol 2 (3), ISSN: 2229-6093, pp-626-630
Emil Wolf, Progress in Optics, Vol. 60, Elsevier, 2015, pp-139.
Cryptography and Network Security, forth edition, by William Stallings.
WAYN96 Wayner, P. Disappearing Cryptography, Boston: AP Professional Books, 1996.
Cryptography and Network Security, Principles and practices, second edition, by William Stallings.
The article licensed under the “Code Project Open License” (COPL) by Corinna John.
Digital Electronics by R. P. Jain, BPB Publications.
Domenico Bloisi and Luca Iocchi, IMAGE BASED STEGANOGRAPHY AND CRYPTOGRAPHY, Dipartimento di Informatica e Sistemistica Sapienza University of Rome, Italy.
M. Arora, S. Sharma, "Synthesis of Cryptography and Security Attacks", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.5, pp.1-5, 2017.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.