Review Papers | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015
Steganography & Cryptography for Regimented Data Hiding System: A Review
Akash Sharma, Nikita Jain
Nowadays, due to rapid development of communication techniques & its applications over the open communication channel, security-issues have the top priority. Communication of secret information is a critical factor in information technology that continues to create challenges with increasing levels of sophistication. However, in recent years, two techniques cryptography and steganography have been used widely in direction to trim down the security issues but different terrains pose separate challenges. This paper presents a comprehensive investigation on modern as well as traditional security methods with their inadequacies in direction to explain accessible security techniques in better way to new researchers and motivate them to design and implement a novel system that improve the level of security.
Keywords: Information Hiding, Security, Steganography, Cryptography
Edition: Volume 4 Issue 4, April 2015
Pages: 3119 - 3124
How to Cite this Article?
Akash Sharma, Nikita Jain, "Steganography & Cryptography for Regimented Data Hiding System: A Review", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153868, Volume 4 Issue 4, April 2015, 3119 - 3124
98 PDF Views | 84 PDF Downloads
Similar Articles with Keyword 'Information Hiding'
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 907 - 910A Steganography Approach to Protect Secret Information in Computer Network
Prajakta B. Diwan, V. B. Bhagat
Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 1548 - 1550Joint Task Migration and Power Management in Wireless Computing
Dayanand G Savakar, Anand S Ghuli
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1584 - 1590Survey on Information Hiding Using Image Based Steganography and Cryptography
Priyanka Mehta, Jignesh Vania
Review Papers, Computer Science & Engineering, Jordan, Volume 7 Issue 6, June 2018
Pages: 1713 - 1715Steganography and Watermarking: Review
Mohammed Salem Atoum
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 3119 - 3124Steganography & Cryptography for Regimented Data Hiding System: A Review
Akash Sharma, Nikita Jain
Similar Articles with Keyword 'Security'
Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 890 - 894A Survey on Types of Crawlers and Web Searching Algorithms
T. Yogameera, Dr. D. Shanthi
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin
Similar Articles with Keyword 'Steganography'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1175 - 1178Steganographic Method of Data Hiding using JPEG Images
Shabana Vathelil Subair, Fathima A Muhammadali
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1467 - 1471XOR Encryption Based Video Steganography
Ramandeep Kaur, Pooja
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1526 - 1530A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention
Anju Mohan
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 907 - 910A Steganography Approach to Protect Secret Information in Computer Network
Prajakta B. Diwan, V. B. Bhagat
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1944 - 1949A Review of Privacy Protection of Cloud Storage and Steganography Techniques
Alok Ranjan, Mansi Bhonsle
Similar Articles with Keyword 'Cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur