Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014
Survey on Information Hiding Using Image Based Steganography and Cryptography
Priyanka Mehta, Jignesh Vania
Nowadays, the Internet is an indepensable communication channel of today's life. In wide systems, information should be transferred via safe communication channels including data security, copyright safety, human privacy, etc. Some potential problems, however, have resulted from the improving Internet, such as the copy and corruption of digital information. Therefore, the information security is considered as one immediate topic. Technologies for information and communication security have brought forth powerful tools to make this vision come true, despite many different kinds of adverse circumstances. Cryptography and steganography are the most widely used techniques to defeat this threat. Cryptography involves converting a message text into a scribbled cipher. On the other hand, steganography embeds message into a cover media and hides its existence. Both the techniques provide some security of data, neither of them is individually secure enough for sharing information over an unsecure communication channel and are vulnerable to intruder attacks. Many techniques came into existence to hide message securely in different types of cover media like video, audio and also images.
Keywords: steganography, cryptography, RSA encryption, canny edge detector, LSB
Edition: Volume 3 Issue 12, December 2014
Pages: 1584 - 1590
How to Cite this Article?
Priyanka Mehta, Jignesh Vania, "Survey on Information Hiding Using Image Based Steganography and Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14784, Volume 3 Issue 12, December 2014, 1584 - 1590
93 PDF Views | 82 PDF Downloads
Similar Articles with Keyword 'steganography'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1175 - 1178Steganographic Method of Data Hiding using JPEG Images
Shabana Vathelil Subair, Fathima A Muhammadali
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1467 - 1471XOR Encryption Based Video Steganography
Ramandeep Kaur, Pooja
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 907 - 910A Steganography Approach to Protect Secret Information in Computer Network
Prajakta B. Diwan, V. B. Bhagat
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1944 - 1949A Review of Privacy Protection of Cloud Storage and Steganography Techniques
Alok Ranjan, Mansi Bhonsle
Similar Articles with Keyword 'cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Similar Articles with Keyword 'RSA encryption'
Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1721 - 1725Secured Load Rebalancing for Distributed Files System in Cloud
Jayesh D. Kamble, Y. B. Gurav
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 2073 - 2076Secure Cloud DBaaS by Client and Server side Encryption
Ashok Jayadar, A. R. Arunachalam
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1584 - 1590Survey on Information Hiding Using Image Based Steganography and Cryptography
Priyanka Mehta, Jignesh Vania
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1235 - 1238Security Enhancement of Single Sign-On Mechanism for Multiple Service Authentications
Anil. P. Jawalkar, R. Radha
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013
Pages: 59 - 66Object Oriented Steganography using Skin Tone Detection and RSA Encryption Scheme
Aruna Mittal
Similar Articles with Keyword 'canny edge detector'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1584 - 1590Survey on Information Hiding Using Image Based Steganography and Cryptography
Priyanka Mehta, Jignesh Vania
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016
Pages: 1254 - 1257A Literature Survey on Various Methods used for Metal Defects Detection Using Image Segmentation
M. H. Thasin Fouzia, Dr. K. Nirmala
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 213 - 215Object Detection Using the Canny Edge Detector
Mathew George, C. Lakshmi
Similar Articles with Keyword 'LSB'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1062 - 1064Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition
Devashri Anil Vyawahare, Prof. Anil Gujar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1467 - 1471XOR Encryption Based Video Steganography
Ramandeep Kaur, Pooja
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2447 - 2449Enhanced Security Providing using Visual Cryptography
Ketan Raju Kundiya, Ram B. Joshi
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2325 - 2330Secure Text/Image Data Hiding in Images with Efficient Key Management
Anjaly Mohanachandran, Mary Linda P.A.
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1976 - 1979Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method
Ekata S. Bele, Chetan Bawankar