Open Access   Article Go Back

An analytical study of Cryptography and Steganography technique for robust Security and integrity of the data

Hitendra Donga1 , Kishor Atkotiya2

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-9 , Page no. 741-746, Sep-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i9.741746

Online published on Sep 30, 2018

Copyright © Hitendra Donga, Kishor Atkotiya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Hitendra Donga, Kishor Atkotiya, “An analytical study of Cryptography and Steganography technique for robust Security and integrity of the data,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.741-746, 2018.

MLA Style Citation: Hitendra Donga, Kishor Atkotiya "An analytical study of Cryptography and Steganography technique for robust Security and integrity of the data." International Journal of Computer Sciences and Engineering 6.9 (2018): 741-746.

APA Style Citation: Hitendra Donga, Kishor Atkotiya, (2018). An analytical study of Cryptography and Steganography technique for robust Security and integrity of the data. International Journal of Computer Sciences and Engineering, 6(9), 741-746.

BibTex Style Citation:
@article{Donga_2018,
author = {Hitendra Donga, Kishor Atkotiya},
title = {An analytical study of Cryptography and Steganography technique for robust Security and integrity of the data},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {741-746},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2937},
doi = {https://doi.org/10.26438/ijcse/v6i9.741746}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.741746}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2937
TI - An analytical study of Cryptography and Steganography technique for robust Security and integrity of the data
T2 - International Journal of Computer Sciences and Engineering
AU - Hitendra Donga, Kishor Atkotiya
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 741-746
IS - 9
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
437 295 downloads 212 downloads
  
  
           

Abstract

As we all know the data security is the biggest concern for all the domains and it has very deep impact on the data and its security. Here in this paper we have tried to carry out the analytical study of the different cryptography and steganography technique which is used to maintain the integrity of the data. Any type of cover object can be taken that may be text, image or video to embed the secret information. In this paper a brief analysis of different image stegnography techniques and their comparison is done.

Key-Words / Index Term

Steganography, Embedding, LZW, Stego-Key, PSNR

References

[1] V.Sharma and S. Kumar,“A New Approach to Hide Text in Images Using Steganography”, International Journal of Advanced Research in computer science and Software Engineering, vol3, pp 701-708,2013.G. Kaur and A. Kochhar, “A Steganography Implementation based on LSB and DCT”, International Journal for Science and Emerging Technologies, vol4, pp 36-41,
2012.
[2] Kumar and R. Sharma, “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique”, International Journal of Advanced Research in computer science and Software Engineering, vol3, pp
363-372,2013.
[3] G. Kaur and A. Kochhar,“A Steganography Implementation based on LSB and DCT”, International Journal for Science and Emerging Technologies, vol4,
pp 36-41, 2012.
[4] A.M.AL-Shatnawi, “A New method in Image Steganography with improved Image Quality”, Applied Mathematical Sciences, vol6, pp 3908-3915, 2012.
[5] R. Kaur, B. Singh and I. Singh, “A Comparative Study of Different Bit Positions in Image Steganography”, International Journal of modern engineering research,vol2, pp 3835-3840,2012.
[6] R. Jain and N. Kumar, “Efficient data hiding scheme using lossless data compression and image Steganography”, International journal of engineering
science and technology, vol4, pp 3908-3915,2012
[7] Hemalatha S, U Dinesh Acharya, Renuka A and PriyaR.
Kamath, “A Secure and High Capacity Image Steganography Technique”, International Journal (signal and image processing), vol4, pp 83-89, 2013.
[8] T. Morkel J.H.P Eloff, M.S. Olivier, “An overview of Image Steganography”, information and computer security architecture research group department of computer science, 2005.


[9] S.Singh and G.Aggarwal, “Use of image to secure text message with the help LSB replacement”, International Journal of applied engineering research, vol1, pp 2010.
[10] S. Arora, S. Anand, “A Proposed method for Image Steganography using Edge Detection”, International Journal for emerging technology and Advanced Engineering, vol3, pp 296-297,2013.
[11] Neil F. Jonhson and S. Jajodia, “Exploring
Steganography: Seeing the Unseen”, pp 26-34, IEEE
1998.
[12] P. Kumari, C. Kumar, Preeyanshi and J. Bhushan, “Data
Security Using Image Steganography and Weighing Its Techniques”, International Journal of Scientific and Technology,vol2, pp 238-241, 2013.
[13] H.S. Majunatha Reddy and K.B. Raja, “High capacity and security Steganography using discrete wavelet transform”, International Journal of Computer Science and Security, pp. 462-472,2009.
[14] Niels Provos and Peter Honeyman,”Hide and Seek: An
Introduction to Steganography”, pp 32-44, IEEE 2003. [15] S.Channalli and A .Jadhav, “Steganography an art of
Hiding Data”, International Journal on Computer
Science and Engineering, vol1, pp 137-141,2009.