Steganography & Cryptography for Regimented Data Hiding System: A Review
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 108 | Views: 274

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.6 / 10


     

Steganography & Cryptography for Regimented Data Hiding System: A Review

Akash Sharma, Nikita Jain


Abstract: Nowadays, due to rapid development of communication techniques & its applications over the open communication channel, security-issues have the top priority. Communication of secret information is a critical factor in information technology that continues to create challenges with increasing levels of sophistication. However, in recent years, two techniques cryptography and steganography have been used widely in direction to trim down the security issues but different terrains pose separate challenges. This paper presents a comprehensive investigation on modern as well as traditional security methods with their inadequacies in direction to explain accessible security techniques in better way to new researchers and motivate them to design and implement a novel system that improve the level of security.


Keywords: Information Hiding, Security, Steganography, Cryptography


Edition: Volume 4 Issue 4, April 2015


Pages: 3119 - 3124



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Akash Sharma, Nikita Jain, "Steganography & Cryptography for Regimented Data Hiding System: A Review", International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 3119-3124, https://www.ijsr.net/getabstract.php?paperid=SUB153868, DOI: https://www.doi.org/10.21275/SUB153868

Similar Articles

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1023 - 1029

A Survey and High-Level Design on Human Activity Recognition

Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 642 - 647

Face Liveness to Identify Between Actual Face and Spoof Face

Lovely Pal, Renuka Singh

Share this Article
Top