An analytical study of Cryptography and Steganography technique for robust Security and integrity of the data

Authors

  • Donga H Dept. of CS IT, Shree M. & N. Virani Science College(Autonomous), Rajkot
  • Atkotiya K Department of Statistics, Saurashtra University, Rajkot

DOI:

https://doi.org/10.26438/ijcse/v6i9.741746

Keywords:

Steganography, Embedding, LZW, Stego-Key, PSNR

Abstract

As we all know the data security is the biggest concern for all the domains and it has very deep impact on the data and its security. Here in this paper we have tried to carry out the analytical study of the different cryptography and steganography technique which is used to maintain the integrity of the data. Any type of cover object can be taken that may be text, image or video to embed the secret information. In this paper a brief analysis of different image stegnography techniques and their comparison is done

References

V.Sharma and S. Kumar,“A New Approach to Hide Text in Images Using Steganography”, International Journal of Advanced Research in computer science and Software Engineering, vol3, pp 701-708,2013.G. Kaur and A. Kochhar, “A Steganography Implementation based on LSB and DCT”, International Journal for Science and Emerging Technologies, vol4, pp 36-41, 2012.

Kumar and R. Sharma, “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique”, International Journal of Advanced Research in computer science and Software Engineering, vol3, pp 363-372,2013.

G. Kaur and A. Kochhar,“A Steganography Implementation based on LSB and DCT”, International Journal for Science and Emerging Technologies, vol4, pp 36-41, 2012.

A.M.AL-Shatnawi, “A New method in Image Steganography with improved Image Quality”, Applied Mathematical Sciences, vol6, pp 3908-3915, 2012.

R. Kaur, B. Singh and I. Singh, “A Comparative Study of Different Bit Positions in Image Steganography”, International Journal of modern engineering research,vol2, pp 3835-3840,2012.

R. Jain and N. Kumar, “Efficient data hiding scheme using lossless data compression and image Steganography”, International journal of engineering science and technology, vol4, pp 3908-3915,2012

Hemalatha S, U Dinesh Acharya, Renuka A and PriyaR. Kamath, “A Secure and High Capacity Image Steganography Technique”, International Journal (signal and image processing), vol4, pp 83-89, 2013.

T. Morkel J.H.P Eloff, M.S. Olivier, “An overview of Image Steganography”, information and computer security architecture research group department of computer science, 2005.

S.Singh and G.Aggarwal, “Use of image to secure text message with the help LSB replacement”, International Journal of applied engineering research, vol1, pp 2010.

S. Arora, S. Anand, “A Proposed method for Image Steganography using Edge Detection”, International Journal for emerging technology and Advanced Engineering, vol3, pp 296-297,2013.

Neil F. Jonhson and S. Jajodia, “Exploring Steganography: Seeing the Unseen”, pp 26-34, IEEE 1998.

P. Kumari, C. Kumar, Preeyanshi and J. Bhushan, “Data Security Using Image Steganography and Weighing Its Techniques”, International Journal of Scientific and Technology,vol2, pp 238-241, 2013.

H.S. Majunatha Reddy and K.B. Raja, “High capacity and security Steganography using discrete wavelet transform”, International Journal of Computer Science and Security, pp. 462-472,2009.

Niels Provos and Peter Honeyman,”Hide and Seek: An Introduction to Steganography”, pp 32-44, IEEE 2003. [15] S.Channalli and A

.Jadhav, “Steganography an art of Hiding Data”, International Journal on Computer Science and Engineering, vol1, pp 137-141,2009.

Downloads

Published

2025-11-15
CITATION
DOI: 10.26438/ijcse/v6i9.741746
Published: 2025-11-15

How to Cite

[1]
H. Donga and K. Atkotiya, “An analytical study of Cryptography and Steganography technique for robust Security and integrity of the data”, Int. J. Comp. Sci. Eng., vol. 6, no. 9, pp. 741–746, Nov. 2025.