Survey on Information Hiding Using Image Based Steganography and Cryptography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Survey on Information Hiding Using Image Based Steganography and Cryptography

Priyanka Mehta, Jignesh Vania

Nowadays, the Internet is an indepensable communication channel of today's life. In wide systems, information should be transferred via safe communication channels including data security, copyright safety, human privacy, etc. Some potential problems, however, have resulted from the improving Internet, such as the copy and corruption of digital information. Therefore, the information security is considered as one immediate topic. Technologies for information and communication security have brought forth powerful tools to make this vision come true, despite many different kinds of adverse circumstances. Cryptography and steganography are the most widely used techniques to defeat this threat. Cryptography involves converting a message text into a scribbled cipher. On the other hand, steganography embeds message into a cover media and hides its existence. Both the techniques provide some security of data, neither of them is individually secure enough for sharing information over an unsecure communication channel and are vulnerable to intruder attacks. Many techniques came into existence to hide message securely in different types of cover media like video, audio and also images.

Keywords: steganography, cryptography, RSA encryption, canny edge detector, LSB

Edition: Volume 3 Issue 12, December 2014

Pages: 1584 - 1590

Share this Article

How to Cite this Article?

Priyanka Mehta, Jignesh Vania, "Survey on Information Hiding Using Image Based Steganography and Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14784, Volume 3 Issue 12, December 2014, 1584 - 1590

93 PDF Views | 82 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'steganography'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 907 - 910

A Steganography Approach to Protect Secret Information in Computer Network

Prajakta B. Diwan, V. B. Bhagat

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1944 - 1949

A Review of Privacy Protection of Cloud Storage and Steganography Techniques

Alok Ranjan, Mansi Bhonsle

Share this Article

Similar Articles with Keyword 'cryptography'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Similar Articles with Keyword 'RSA encryption'

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1721 - 1725

Secured Load Rebalancing for Distributed Files System in Cloud

Jayesh D. Kamble, Y. B. Gurav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2073 - 2076

Secure Cloud DBaaS by Client and Server side Encryption

Ashok Jayadar, A. R. Arunachalam

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1584 - 1590

Survey on Information Hiding Using Image Based Steganography and Cryptography

Priyanka Mehta, Jignesh Vania

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1235 - 1238

Security Enhancement of Single Sign-On Mechanism for Multiple Service Authentications

Anil. P. Jawalkar, R. Radha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013

Pages: 59 - 66

Object Oriented Steganography using Skin Tone Detection and RSA Encryption Scheme

Aruna Mittal

Share this Article

Similar Articles with Keyword 'canny edge detector'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1584 - 1590

Survey on Information Hiding Using Image Based Steganography and Cryptography

Priyanka Mehta, Jignesh Vania

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 10, October 2016

Pages: 1254 - 1257

A Literature Survey on Various Methods used for Metal Defects Detection Using Image Segmentation

M. H. Thasin Fouzia, Dr. K. Nirmala

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 213 - 215

Object Detection Using the Canny Edge Detector

Mathew George, C. Lakshmi

Share this Article

Similar Articles with Keyword 'LSB'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2447 - 2449

Enhanced Security Providing using Visual Cryptography

Ketan Raju Kundiya, Ram B. Joshi

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2325 - 2330

Secure Text/Image Data Hiding in Images with Efficient Key Management

Anjaly Mohanachandran, Mary Linda P.A.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1976 - 1979

Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method

Ekata S. Bele, Chetan Bawankar

Share this Article
Top