An analytical study of Cryptography and Steganography technique for robust Security and integrity of the data
DOI:
https://doi.org/10.26438/ijcse/v6i9.741746Keywords:
Steganography, Embedding, LZW, Stego-Key, PSNRAbstract
As we all know the data security is the biggest concern for all the domains and it has very deep impact on the data and its security. Here in this paper we have tried to carry out the analytical study of the different cryptography and steganography technique which is used to maintain the integrity of the data. Any type of cover object can be taken that may be text, image or video to embed the secret information. In this paper a brief analysis of different image stegnography techniques and their comparison is done
References
V.Sharma and S. Kumar,“A New Approach to Hide Text in Images Using Steganography”, International Journal of Advanced Research in computer science and Software Engineering, vol3, pp 701-708,2013.G. Kaur and A. Kochhar, “A Steganography Implementation based on LSB and DCT”, International Journal for Science and Emerging Technologies, vol4, pp 36-41, 2012.
Kumar and R. Sharma, “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique”, International Journal of Advanced Research in computer science and Software Engineering, vol3, pp 363-372,2013.
G. Kaur and A. Kochhar,“A Steganography Implementation based on LSB and DCT”, International Journal for Science and Emerging Technologies, vol4, pp 36-41, 2012.
A.M.AL-Shatnawi, “A New method in Image Steganography with improved Image Quality”, Applied Mathematical Sciences, vol6, pp 3908-3915, 2012.
R. Kaur, B. Singh and I. Singh, “A Comparative Study of Different Bit Positions in Image Steganography”, International Journal of modern engineering research,vol2, pp 3835-3840,2012.
R. Jain and N. Kumar, “Efficient data hiding scheme using lossless data compression and image Steganography”, International journal of engineering science and technology, vol4, pp 3908-3915,2012
Hemalatha S, U Dinesh Acharya, Renuka A and PriyaR. Kamath, “A Secure and High Capacity Image Steganography Technique”, International Journal (signal and image processing), vol4, pp 83-89, 2013.
T. Morkel J.H.P Eloff, M.S. Olivier, “An overview of Image Steganography”, information and computer security architecture research group department of computer science, 2005.
S.Singh and G.Aggarwal, “Use of image to secure text message with the help LSB replacement”, International Journal of applied engineering research, vol1, pp 2010.
S. Arora, S. Anand, “A Proposed method for Image Steganography using Edge Detection”, International Journal for emerging technology and Advanced Engineering, vol3, pp 296-297,2013.
Neil F. Jonhson and S. Jajodia, “Exploring Steganography: Seeing the Unseen”, pp 26-34, IEEE 1998.
P. Kumari, C. Kumar, Preeyanshi and J. Bhushan, “Data Security Using Image Steganography and Weighing Its Techniques”, International Journal of Scientific and Technology,vol2, pp 238-241, 2013.
H.S. Majunatha Reddy and K.B. Raja, “High capacity and security Steganography using discrete wavelet transform”, International Journal of Computer Science and Security, pp. 462-472,2009.
Niels Provos and Peter Honeyman,”Hide and Seek: An Introduction to Steganography”, pp 32-44, IEEE 2003. [15] S.Channalli and A
.Jadhav, “Steganography an art of Hiding Data”, International Journal on Computer Science and Engineering, vol1, pp 137-141,2009.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
