2010
DOI: 10.5120/1433-1932
|View full text |Cite
|
Sign up to set email alerts
|

Security Enhancement: Combining Cryptography and Steganography

Abstract: In today's world of high technology, it is not safe to share confidential and important data on any network. Intruders are always in wake of it. They hack the data and use it for their benefit. These malicious people try to gain benefit, get attention, or to harm someone. In either case, message sender or receiver has to pay the price. To avoid these undesirable acts, Steganography and cryptography are used together to ensure security of the covert and secure message. One of the most efficient and secure algor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 6 publications
0
12
0
Order By: Relevance
“…In [13], authors first embed the secret data within cover image using LSB technique and then apply DES encryption method for encrypting the data which provides better security.…”
Section: Steganography Vs Cryptographymentioning
confidence: 99%
See 1 more Smart Citation
“…In [13], authors first embed the secret data within cover image using LSB technique and then apply DES encryption method for encrypting the data which provides better security.…”
Section: Steganography Vs Cryptographymentioning
confidence: 99%
“…Intruders may reveal the information to others, misuse or modify the information, misrepresent them to an individual/ organization or use them to plan even some more severe attacks [13]. One of the solutions to this problem is through the use of steganography and cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…2) Text encryption with Data Encryption Standard (DES) and LSB insertion Dhawal Seth et Al [14] combines cryptography and steganography, so as to ensure more security over insecure communication channel. DES cryptographic algorithm being used for encrypting the text message in conjunction with LSB substitution for embedding the encrypted message in the cover image.…”
Section: )mentioning
confidence: 99%
“…Cryptography originates from the Greek words "κρυπτός, Kryptos, "Hidden / Secret" and γράφειν, graphein, "writing". The original message to be encoded is called the "Plain Text", the message obtained at the end of the conversion is called the "Cipher Text", the coding of the message during the conversion is called the "encryption" and the reversal process of this is called the "decryption" (Menezes et al, 1996;Seth et al, 2010;Stallings, 2010;Narayana and Prasad, 2010;Nivedhitha and Meyyappan, 2012). The AES -Advanced Encryption Standard method is the one used most in cryptography method.…”
Section: Introductionmentioning
confidence: 99%