SlideShare a Scribd company logo
1 of 5
Download to read offline
@ IJTSRD | Available Online @ www.ijtsrd.com
ISSN No: 2456
International
Research
A Survey on Enhancement of Text Security U
Steganography a
Priya Jain
1
M. Tech Student,
Department of Computer Science Engineering,
Noida Institute of Engineering & Technology,
ABSTRACT
Increase in the number of attack recorded during
electronic exchange of information between the
source and intended destination has indeed called for
a more robust method for securing data
Cryptography and steganography are well known and
widely used techniques that manipulate information in
order to cipher or hide their existence. Many different
carrier file format scan be used but digital images are
the most popular because of their frequency on the
internet. The digital images are the most popular
because of their frequency on the Web among all
different carrier file formats. Image steganography,
achieves the secrecy by embedding data into cover
image and generating a stego-image. There are many
types of steganography techniques each have their
advantages and disadvantages. This paper discussed a
technique used on the advanced LSB (least significant
bit) and RSA algorithm. By matching data to an
image, there is less chance of an attacker being able to
use steganalysis to recover data. Before hiding the
data in an image the application first encrypts it.
Keywords: Stegnography, Cryptography, LSB
I. INTRODUCTION
The growing use of Internet among public masses and
availability of public and private digital data and its
sharing has driven industry professionals and
researchers to pay a particular attention to information
security. Internet users frequently need to s
or receive private information and this private
information needs to be protected against
unauthorized access and attacks. Presently, three main
methods of information security being used:
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume
International Journal of Trend in Scientific
Research and Development (IJTSRD)
International Open Access Journal
n Enhancement of Text Security U
Steganography and Cryptographic Techniques
Priya Jain1
, Somesh Kumar2
, Raj Kumar Goel2
M. Tech Student, 2
Assistant Professor
Department of Computer Science Engineering,
Noida Institute of Engineering & Technology, Greater Noida, Uttar Pradesh, India
Increase in the number of attack recorded during
electronic exchange of information between the
source and intended destination has indeed called for
a more robust method for securing data transfer.
Cryptography and steganography are well known and
widely used techniques that manipulate information in
order to cipher or hide their existence. Many different
carrier file format scan be used but digital images are
eir frequency on the
internet. The digital images are the most popular
because of their frequency on the Web among all
different carrier file formats. Image steganography,
achieves the secrecy by embedding data into cover
. There are many
types of steganography techniques each have their
advantages and disadvantages. This paper discussed a
technique used on the advanced LSB (least significant
bit) and RSA algorithm. By matching data to an
ttacker being able to
use steganalysis to recover data. Before hiding the
data in an image the application first encrypts it.
Stegnography, Cryptography, LSB
The growing use of Internet among public masses and
availability of public and private digital data and its
sharing has driven industry professionals and
researchers to pay a particular attention to information
security. Internet users frequently need to store, send,
or receive private information and this private
information needs to be protected against
unauthorized access and attacks. Presently, three main
methods of information security being used:
watermarking, cryptography and steganography. In
watermarking, data are hidden to convey some
information about the cover medium such as
ownership and copyright. Cryptography techniques
are based on rendering the content of a message
garbled to unauthorized people. Steganography
techniques are based on hidi
information by embedding the secret message in
another cover medium. While all three are
information security techniques cryptography and
steganography are having wide application as
watermarking is limited to having information
particularly about the cover medium. With the growth
of computer network, security of data has become a
major concern and thus data hiding technique has
attracted people around the globe. Steganography
techniques are used to address digital copyrights
management, protect information, and conceal secrets.
Cryptography involves converting a message text into
an unreadable cipher. A large number of cryptography
algorithms have been created till date with the
primary objective of converting information into
unreadable ciphers Cryptography systems can be
broadly classified into symmetric
public key systems. The symmetric key system uses a
common key for encryption and decryption of the
message. This key is shared privately by the sender
and the receiver. The sender encrypts the data using
the joint key and then sends it to the receiver who
decrypts the data using the same key to retrieve the
original message. The public-
different key for encryption as one used for
decryption. Public key systems require each user to
have two keys – a public key and a private key (secret
2018 Page: 20
6470 | www.ijtsrd.com | Volume - 2 | Issue – 5
Scientific
(IJTSRD)
International Open Access Journal
n Enhancement of Text Security Using
Cryptographic Techniques
Uttar Pradesh, India
watermarking, cryptography and steganography. In
ermarking, data are hidden to convey some
information about the cover medium such as
ownership and copyright. Cryptography techniques
are based on rendering the content of a message
garbled to unauthorized people. Steganography
techniques are based on hiding the existence of
information by embedding the secret message in
another cover medium. While all three are
information security techniques cryptography and
steganography are having wide application as
watermarking is limited to having information
larly about the cover medium. With the growth
of computer network, security of data has become a
major concern and thus data hiding technique has
attracted people around the globe. Steganography
techniques are used to address digital copyrights
protect information, and conceal secrets.
Cryptography involves converting a message text into
an unreadable cipher. A large number of cryptography
algorithms have been created till date with the
primary objective of converting information into
ciphers Cryptography systems can be
broadly classified into symmetric-key systems and
public key systems. The symmetric key system uses a
common key for encryption and decryption of the
message. This key is shared privately by the sender
The sender encrypts the data using
the joint key and then sends it to the receiver who
decrypts the data using the same key to retrieve the
- key systems that use a
different key for encryption as one used for
c key systems require each user to
a public key and a private key (secret
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 21
key). The sender of the data encrypts the message
using the receivers public key. The receiver then
decrypts this message using his private key. In this
paper describes all the techniques and proposed works
based on cryptography and steganography.
II. LITERATURE REVIEW:
The word steganography is originally derived from
Greek words which mean “Covered Writing”. It is
defined as "hiding information within a noise; a way
to supplement encryption, to prevent the existence of
encrypted data from being detected" [1]. It has been
used in various forms for thousands of years. In the
5th century BC Histaiacus shaved a slave’s head,
tattooed a message on his skull and the slave was
dispatched with the message after his hair grew back [
2, 4,5,7]. Basically, the purpose of cryptography and
steganography is to provide secret communication.
Steganography can be used to cloak hidden messages
in image, audio, video and even text files. According
to [7], the two most common methods used for hiding
information inside a picture, audio and video files are
LSB (Least Significant Bit) and Injection. The survey
of Johnson [6] appeared in the “Information hiding”
book, which limits its distribution compared to a
Journal paper which can be more affordable. The
classification, herein, of the techniques and that of
Johnson are different. Johnson classify steganography
techniques into: Substitution systems, transform
domain techniques, spread spectrum techniques,
statistical methods, distortion techniques, and cover
generation methods. Johnson survey neither talks
about the history of steganography nor its
applications.
Several techniques have been proposed by researchers
for securing electronic communication. In the
research work of [9], the researchers proposed
cryptography and steganography for securing data
transfer using images as cover objects for
steganography and key for the cryptography. The
performance of the proposed ISC (Image-Based
Steganography and Cryptography) system was
presented and the system was compared with F5
algorithm. Also, [10] proposed method that described
two steps for hiding secret information by using the
public steganography based on matching method. The
first step, finds the shared stego-key between the two
communication parties (Alice and Bob) over the
networks by applying Diffie Hellman Key exchange
protocol. The second step in the proposed method is
that, the sender uses the secret stego-key to select
pixels that it will be used to hide.
Alice Bob
Produce random integer r
in [1, n – 1]
Perform partial
key validation on R
Sends (R, c, t)
Compute R = rG
Compute
K = hrQB = (Kx, Ky)
Compute
k1||k2 = KDF(Kx)
Computes
KB = h.dB.R = (Kx, Ky )
Verify that t = MACk2(c)
Computes m = ENCk1
–1
(c)
m is the
decrypted Plain
Text message
Compute
c = ENCk1(m)
Compute
t = MACk2(c)
Compute
k1||k2 = KDF(Kx)
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 22
III. CRYPTOGRAPHY
Cryptography is the art and science of achieving
security by encoding messages to make them non
readable. In this, the structure of message is
scrambled to make it meaningless and unintelligible
unless the decryption key is available. Basically,
cryptography offers the ability of transmitting
information between persons in a way that prevents a
third party from reading it. Cryptography can also
provide authentication for verifying the identity of
something or someone. Cryptanalysis is the reverse
engineering of cryptography. There are several ways
of classifying cryptographic algorithms. The three
types of algorithms are:
1. Secret key Cryptography: Use a single key for
both encryption and decryption
2. Public Key Cryptography: Use one key for
encryption and another for decryption.
3. Hash Functions: Use a mathematical
transformation to irreversibly "encrypt"
information
IV. STEGANOGRAPHY TECHNIQUES
In this method the secret data is embedded directly in
the intensity of pixels. It means some pixel values of
the image are changed directly during hiding data.
Spatial domain techniques are classified into
following categories:
1. Spatial domain techniques
I. Least significant bit (LSB)
II. Pixel value differencing (PVD)
III. Edges based data embedding method (EBE)
IV. Random pixel embedding method (RPE)
V. Mapping pixel to hidden data method
VI. Labeling or connectivity method
VII. Bit Plane Complexity Segmentation (BPCS)
I. LSB: this method is most commonly used for hiding
data. In this method the embedding is done by replacing
the least significant bits of image pixels with the bits of
secret data. The image obtained after embedding is almost
similar to original image because the change in the LSB of
image pixel does not bring too much differences in the
image.
II. BPCS: In this segmentation of image are used by
measuring its complexity. Complexity is used to
determine the noisy block. In this method noisy
blocks of bit plan are replaced by the binary patterns
mapped from a secret data
III. PVD: In this method, two consecutive pixels are
selected for embedding the data. Payload is
determined by checking the difference between two
consecutive pixels and it serves as basis for
identifying whether the two pixels belongs to an edge
area or smooth area.
2. Spread Spectrum Technique:
The concept of spread spectrum is used in this
technique. In this method the secret data is spread
over a wide frequency bandwidth. The ratio of signal
to noise in every frequency band must be so small that
it become difficult to detect the presence of data. Even
if parts of data are removed from several bands, there
would be still enough information is present in other
bands to recover the data. Thus it is difficult to
remove the data completely without entirely
destroying the cover .It is a very robust technique
mostly used in military communication.
3. Statistical Technique:
In the technique message is embedded by changing
several properties of the cover. It involves the
splitting of cover into blocks and then embedding one
message bit in each block. The cover block is
modified only when the size of message bit is one
otherwise no modification is required.
4. Transform Domain Technique:
In this technique; the secret message is embedded in
the transform or frequency domain of the cover. This
is a more complex way of hiding message in an
image. Different algorithms and transformations are
used on the image to hide message in it. Transform
domain techniques are broadly classified such as i)
Discrete Fourier transformation technique (DFT) ii)
Discrete cosine transformation technique (DCT) iii)
Discrete Wavelet transformation technique (DWT) iv)
Lossless or reversible method (DCT) v)Embedding in
coefficient bits.
V. COMBINED CRYPTO STEGANOGRAPHY
Steganography is not the same as cryptography Data
hiding techniques have been widely used to
transmission of hiding secret N message for long
time. Ensuring data security is a big challenge for
computer users. Business men, professionals, and
home users all have some important data that they
want to secure from others. Even though both
methods provide security, to add multiple layers of
security it is always a good practice to use
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 23
Cryptography and Steganography together. By
combining, the data encryption can be done by a
software and then embed the cipher text in an image
or any other media with the help of stego key. The
combination of these two methods will enhance the
security of the data embedded. This combined
chemistry will satisfy the requirements such as
capacity, security and robustness for secure data
transmission over an open channel.
A pictorial representation of the combined concept of
cryptography and steganography is depicted in figure
2.
Figure 2: Systematic graphical representation of
combined Cryptography and Steganography
In figure 2, both the methods are combined by
encrypting message using cryptography and then
hiding the encrypted message using steganography.
The resulting stego-image can be transmitted without
revealing that secret information is being exchanged.
Furthermore, even if an attacker were to defeat the
steganography technique to detect the message from
the stego-object, he would still require the
cryptographic decoding key to decipher the encrypted
message
The steganography approaches can be divided into
three types [8]:
1. Pure Steganography: This technique simply uses
the steganography approach only without combining
other methods. It is working on hiding information
within cover carrier.
2. Secret Key Steganography: The secret key
steganography use the combination of the secret key
cryptography technique and the steganography
approach. The idea of this type is to encrypt the secret
message or data by secret key approach and to hide
the encrypted data within cover carrier.
3. Public Key Steganography: The last type of
steganography is to combine the public key
cryptography approach and the steganography
approach. The idea of this type is to encrypt the secret
data using the public key approach and then hide the
encrypted data within cover carrier.
VI. CONCLUSION
A secured advanced based LSB technique for image
steganography has been proposed. An efficient
steganography method for embedding secret messages
into cover images without producing any major
changes has been accomplished through advanced-
LSB method. In this work, a new way of hiding
information in an image with less variation in image
bits have been proposed, which makes our technique
secure and more efficient than LSB. This technique
also applies a cryptographic method i.e. RSA
algorithm to secure the secret message so that it is not
easy to break the encryption without the key. RSA
algorithm itself is very secure that’s why we used in
this technique to increase the security of the secret
message.
REFERENCES
1. R. Chandramouli, M. Kharrazi, N. Memon,
“Image Steganography and Steganalysis:
Concepts and Practice “Andre Leier.
Cryptography with DNA Binary Strands. Bio
Systems, 57:13–22, April 2000. Communications,
16(4), pp. 474-481.
2. Dipti, K. S. and Neha, B. 2010. Proposed System
for Data Hiding Using Cryptography and
Steganography. International Journal of Computer
Applications. 8(9), pp. 7-10.
3. Jasleen Kour, “Steganography Techniques –A
Review Paper”, International Journal of Emerging
Research inn Management &Technology,
Volume-3, Issue-5, May 2014, pp 132-135.
4. Jayaram, P., Ranganatha, H. R. and Anupama, H.
S. 2011. Information Hiding Using Audio
Steganography – A Survey. International Journal
of Multimedia and Its Application, 3(3), pp. 86-
96.
5. Jie Chen. A DNA-based, bio-molecular
cryptography design. In Circuits and Systems,
2003. ISCAS ’03. Proceedings of the 2003
International Symposium on, volume 3, pages III–
822-825 vol.3, May 2003.
Plain Text Encryptio Cipher text
Cover image
Stego Image
Cipher TextDecryptionPlain Text
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 24
6. Mark D. G. 2003. Chameleon Image
Steganography- Technical Paper. Retrieved 14th
July, 2012 from
http://faculty.ksu.edu.sa/ghazy/Steg/References/re
f13.pdf.
7. N. F. Johnson and S. C. Katzenbeisser, “A survey
of steganographic techniques”, in: S.
Katzenbeisser and F.A.P. Petitcolas, (ed.) (2000)
Information hiding techniques for steganography
and digital watermarking, Norwood: Artech
House,
8. Niels, P. and Peter, H 2003. Hide and Seek: An
Introduction to Steganography. IEEE Computer
Society. IEEE Security and Privacy, pp. 32-44.
9. R. J. Anderson and F. A. P. Petitcolas (2001) On
the limits of the Stegnography, IEEE Journal
Selected Areas in
10. Raphael, A. J., and Sundaram, V. 2011.
Cryptography and Steganography - A Survey.
International Journal of Computer Technology
Application, 2(3), ISSN: 2229-6093, pp. 626-630.
11. S. B. Sadkhan, Cryptography: Current status and
future trends, in: Proceedings of IEEE
International Conference on Information &
Communication Technologies: From Theory to
Applications, Damascus. Syria, April 19-23, 2004,
pp. 417-418.
12. T. Morkel, J. H. P. Eloff, M. S. Olivier, ”An
Overview of Image Steganography”, Information
and Computer Security Architecture (ICSA)
Research Group, Department of Computer
Science, University of Pretoria, SA.

More Related Content

What's hot

Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET Journal
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444IJRAT
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
 
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismSecurity of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismConference Papers
 
Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
 
Steganography document
Steganography documentSteganography document
Steganography documentBSheghembe
 
Using signcryption to protect biometric information
Using signcryption to protect biometric information Using signcryption to protect biometric information
Using signcryption to protect biometric information Phil Griffin
 
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...cscpconf
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAijcisjournal
 

What's hot (18)

Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
 
C01111519
C01111519C01111519
C01111519
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
 
F1803023843
F1803023843F1803023843
F1803023843
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanismSecurity of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
 
Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data CommunicationCryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data Communication
 
Steganography document
Steganography documentSteganography document
Steganography document
 
Using signcryption to protect biometric information
Using signcryption to protect biometric information Using signcryption to protect biometric information
Using signcryption to protect biometric information
 
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 
CNS Solution
CNS SolutionCNS Solution
CNS Solution
 
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAA QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
 

Similar to A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques

Data Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano SystemsData Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano Systemsrinzindorjej
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYAsia Smith
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Praneeta Dehare
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsLisa Brewer
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of SteganographyIOSR Journals
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Imageijtsrd
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET Journal
 

Similar to A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques (20)

319 325
319 325319 325
319 325
 
Data Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano SystemsData Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano Systems
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
H017255560
H017255560H017255560
H017255560
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and Steganography
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography Methods
 
1.doc
1.doc1.doc
1.doc
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of Steganography
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques

  • 1. @ IJTSRD | Available Online @ www.ijtsrd.com ISSN No: 2456 International Research A Survey on Enhancement of Text Security U Steganography a Priya Jain 1 M. Tech Student, Department of Computer Science Engineering, Noida Institute of Engineering & Technology, ABSTRACT Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it. Keywords: Stegnography, Cryptography, LSB I. INTRODUCTION The growing use of Internet among public masses and availability of public and private digital data and its sharing has driven industry professionals and researchers to pay a particular attention to information security. Internet users frequently need to s or receive private information and this private information needs to be protected against unauthorized access and attacks. Presently, three main methods of information security being used: @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal n Enhancement of Text Security U Steganography and Cryptographic Techniques Priya Jain1 , Somesh Kumar2 , Raj Kumar Goel2 M. Tech Student, 2 Assistant Professor Department of Computer Science Engineering, Noida Institute of Engineering & Technology, Greater Noida, Uttar Pradesh, India Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are eir frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover . There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an ttacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it. Stegnography, Cryptography, LSB The growing use of Internet among public masses and availability of public and private digital data and its sharing has driven industry professionals and researchers to pay a particular attention to information security. Internet users frequently need to store, send, or receive private information and this private information needs to be protected against unauthorized access and attacks. Presently, three main methods of information security being used: watermarking, cryptography and steganography. In watermarking, data are hidden to convey some information about the cover medium such as ownership and copyright. Cryptography techniques are based on rendering the content of a message garbled to unauthorized people. Steganography techniques are based on hidi information by embedding the secret message in another cover medium. While all three are information security techniques cryptography and steganography are having wide application as watermarking is limited to having information particularly about the cover medium. With the growth of computer network, security of data has become a major concern and thus data hiding technique has attracted people around the globe. Steganography techniques are used to address digital copyrights management, protect information, and conceal secrets. Cryptography involves converting a message text into an unreadable cipher. A large number of cryptography algorithms have been created till date with the primary objective of converting information into unreadable ciphers Cryptography systems can be broadly classified into symmetric public key systems. The symmetric key system uses a common key for encryption and decryption of the message. This key is shared privately by the sender and the receiver. The sender encrypts the data using the joint key and then sends it to the receiver who decrypts the data using the same key to retrieve the original message. The public- different key for encryption as one used for decryption. Public key systems require each user to have two keys – a public key and a private key (secret 2018 Page: 20 6470 | www.ijtsrd.com | Volume - 2 | Issue – 5 Scientific (IJTSRD) International Open Access Journal n Enhancement of Text Security Using Cryptographic Techniques Uttar Pradesh, India watermarking, cryptography and steganography. In ermarking, data are hidden to convey some information about the cover medium such as ownership and copyright. Cryptography techniques are based on rendering the content of a message garbled to unauthorized people. Steganography techniques are based on hiding the existence of information by embedding the secret message in another cover medium. While all three are information security techniques cryptography and steganography are having wide application as watermarking is limited to having information larly about the cover medium. With the growth of computer network, security of data has become a major concern and thus data hiding technique has attracted people around the globe. Steganography techniques are used to address digital copyrights protect information, and conceal secrets. Cryptography involves converting a message text into an unreadable cipher. A large number of cryptography algorithms have been created till date with the primary objective of converting information into ciphers Cryptography systems can be broadly classified into symmetric-key systems and public key systems. The symmetric key system uses a common key for encryption and decryption of the message. This key is shared privately by the sender The sender encrypts the data using the joint key and then sends it to the receiver who decrypts the data using the same key to retrieve the - key systems that use a different key for encryption as one used for c key systems require each user to a public key and a private key (secret
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 21 key). The sender of the data encrypts the message using the receivers public key. The receiver then decrypts this message using his private key. In this paper describes all the techniques and proposed works based on cryptography and steganography. II. LITERATURE REVIEW: The word steganography is originally derived from Greek words which mean “Covered Writing”. It is defined as "hiding information within a noise; a way to supplement encryption, to prevent the existence of encrypted data from being detected" [1]. It has been used in various forms for thousands of years. In the 5th century BC Histaiacus shaved a slave’s head, tattooed a message on his skull and the slave was dispatched with the message after his hair grew back [ 2, 4,5,7]. Basically, the purpose of cryptography and steganography is to provide secret communication. Steganography can be used to cloak hidden messages in image, audio, video and even text files. According to [7], the two most common methods used for hiding information inside a picture, audio and video files are LSB (Least Significant Bit) and Injection. The survey of Johnson [6] appeared in the “Information hiding” book, which limits its distribution compared to a Journal paper which can be more affordable. The classification, herein, of the techniques and that of Johnson are different. Johnson classify steganography techniques into: Substitution systems, transform domain techniques, spread spectrum techniques, statistical methods, distortion techniques, and cover generation methods. Johnson survey neither talks about the history of steganography nor its applications. Several techniques have been proposed by researchers for securing electronic communication. In the research work of [9], the researchers proposed cryptography and steganography for securing data transfer using images as cover objects for steganography and key for the cryptography. The performance of the proposed ISC (Image-Based Steganography and Cryptography) system was presented and the system was compared with F5 algorithm. Also, [10] proposed method that described two steps for hiding secret information by using the public steganography based on matching method. The first step, finds the shared stego-key between the two communication parties (Alice and Bob) over the networks by applying Diffie Hellman Key exchange protocol. The second step in the proposed method is that, the sender uses the secret stego-key to select pixels that it will be used to hide. Alice Bob Produce random integer r in [1, n – 1] Perform partial key validation on R Sends (R, c, t) Compute R = rG Compute K = hrQB = (Kx, Ky) Compute k1||k2 = KDF(Kx) Computes KB = h.dB.R = (Kx, Ky ) Verify that t = MACk2(c) Computes m = ENCk1 –1 (c) m is the decrypted Plain Text message Compute c = ENCk1(m) Compute t = MACk2(c) Compute k1||k2 = KDF(Kx)
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 22 III. CRYPTOGRAPHY Cryptography is the art and science of achieving security by encoding messages to make them non readable. In this, the structure of message is scrambled to make it meaningless and unintelligible unless the decryption key is available. Basically, cryptography offers the ability of transmitting information between persons in a way that prevents a third party from reading it. Cryptography can also provide authentication for verifying the identity of something or someone. Cryptanalysis is the reverse engineering of cryptography. There are several ways of classifying cryptographic algorithms. The three types of algorithms are: 1. Secret key Cryptography: Use a single key for both encryption and decryption 2. Public Key Cryptography: Use one key for encryption and another for decryption. 3. Hash Functions: Use a mathematical transformation to irreversibly "encrypt" information IV. STEGANOGRAPHY TECHNIQUES In this method the secret data is embedded directly in the intensity of pixels. It means some pixel values of the image are changed directly during hiding data. Spatial domain techniques are classified into following categories: 1. Spatial domain techniques I. Least significant bit (LSB) II. Pixel value differencing (PVD) III. Edges based data embedding method (EBE) IV. Random pixel embedding method (RPE) V. Mapping pixel to hidden data method VI. Labeling or connectivity method VII. Bit Plane Complexity Segmentation (BPCS) I. LSB: this method is most commonly used for hiding data. In this method the embedding is done by replacing the least significant bits of image pixels with the bits of secret data. The image obtained after embedding is almost similar to original image because the change in the LSB of image pixel does not bring too much differences in the image. II. BPCS: In this segmentation of image are used by measuring its complexity. Complexity is used to determine the noisy block. In this method noisy blocks of bit plan are replaced by the binary patterns mapped from a secret data III. PVD: In this method, two consecutive pixels are selected for embedding the data. Payload is determined by checking the difference between two consecutive pixels and it serves as basis for identifying whether the two pixels belongs to an edge area or smooth area. 2. Spread Spectrum Technique: The concept of spread spectrum is used in this technique. In this method the secret data is spread over a wide frequency bandwidth. The ratio of signal to noise in every frequency band must be so small that it become difficult to detect the presence of data. Even if parts of data are removed from several bands, there would be still enough information is present in other bands to recover the data. Thus it is difficult to remove the data completely without entirely destroying the cover .It is a very robust technique mostly used in military communication. 3. Statistical Technique: In the technique message is embedded by changing several properties of the cover. It involves the splitting of cover into blocks and then embedding one message bit in each block. The cover block is modified only when the size of message bit is one otherwise no modification is required. 4. Transform Domain Technique: In this technique; the secret message is embedded in the transform or frequency domain of the cover. This is a more complex way of hiding message in an image. Different algorithms and transformations are used on the image to hide message in it. Transform domain techniques are broadly classified such as i) Discrete Fourier transformation technique (DFT) ii) Discrete cosine transformation technique (DCT) iii) Discrete Wavelet transformation technique (DWT) iv) Lossless or reversible method (DCT) v)Embedding in coefficient bits. V. COMBINED CRYPTO STEGANOGRAPHY Steganography is not the same as cryptography Data hiding techniques have been widely used to transmission of hiding secret N message for long time. Ensuring data security is a big challenge for computer users. Business men, professionals, and home users all have some important data that they want to secure from others. Even though both methods provide security, to add multiple layers of security it is always a good practice to use
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 23 Cryptography and Steganography together. By combining, the data encryption can be done by a software and then embed the cipher text in an image or any other media with the help of stego key. The combination of these two methods will enhance the security of the data embedded. This combined chemistry will satisfy the requirements such as capacity, security and robustness for secure data transmission over an open channel. A pictorial representation of the combined concept of cryptography and steganography is depicted in figure 2. Figure 2: Systematic graphical representation of combined Cryptography and Steganography In figure 2, both the methods are combined by encrypting message using cryptography and then hiding the encrypted message using steganography. The resulting stego-image can be transmitted without revealing that secret information is being exchanged. Furthermore, even if an attacker were to defeat the steganography technique to detect the message from the stego-object, he would still require the cryptographic decoding key to decipher the encrypted message The steganography approaches can be divided into three types [8]: 1. Pure Steganography: This technique simply uses the steganography approach only without combining other methods. It is working on hiding information within cover carrier. 2. Secret Key Steganography: The secret key steganography use the combination of the secret key cryptography technique and the steganography approach. The idea of this type is to encrypt the secret message or data by secret key approach and to hide the encrypted data within cover carrier. 3. Public Key Steganography: The last type of steganography is to combine the public key cryptography approach and the steganography approach. The idea of this type is to encrypt the secret data using the public key approach and then hide the encrypted data within cover carrier. VI. CONCLUSION A secured advanced based LSB technique for image steganography has been proposed. An efficient steganography method for embedding secret messages into cover images without producing any major changes has been accomplished through advanced- LSB method. In this work, a new way of hiding information in an image with less variation in image bits have been proposed, which makes our technique secure and more efficient than LSB. This technique also applies a cryptographic method i.e. RSA algorithm to secure the secret message so that it is not easy to break the encryption without the key. RSA algorithm itself is very secure that’s why we used in this technique to increase the security of the secret message. REFERENCES 1. R. Chandramouli, M. Kharrazi, N. Memon, “Image Steganography and Steganalysis: Concepts and Practice “Andre Leier. Cryptography with DNA Binary Strands. Bio Systems, 57:13–22, April 2000. Communications, 16(4), pp. 474-481. 2. Dipti, K. S. and Neha, B. 2010. Proposed System for Data Hiding Using Cryptography and Steganography. International Journal of Computer Applications. 8(9), pp. 7-10. 3. Jasleen Kour, “Steganography Techniques –A Review Paper”, International Journal of Emerging Research inn Management &Technology, Volume-3, Issue-5, May 2014, pp 132-135. 4. Jayaram, P., Ranganatha, H. R. and Anupama, H. S. 2011. Information Hiding Using Audio Steganography – A Survey. International Journal of Multimedia and Its Application, 3(3), pp. 86- 96. 5. Jie Chen. A DNA-based, bio-molecular cryptography design. In Circuits and Systems, 2003. ISCAS ’03. Proceedings of the 2003 International Symposium on, volume 3, pages III– 822-825 vol.3, May 2003. Plain Text Encryptio Cipher text Cover image Stego Image Cipher TextDecryptionPlain Text
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 5 | Jul-Aug 2018 Page: 24 6. Mark D. G. 2003. Chameleon Image Steganography- Technical Paper. Retrieved 14th July, 2012 from http://faculty.ksu.edu.sa/ghazy/Steg/References/re f13.pdf. 7. N. F. Johnson and S. C. Katzenbeisser, “A survey of steganographic techniques”, in: S. Katzenbeisser and F.A.P. Petitcolas, (ed.) (2000) Information hiding techniques for steganography and digital watermarking, Norwood: Artech House, 8. Niels, P. and Peter, H 2003. Hide and Seek: An Introduction to Steganography. IEEE Computer Society. IEEE Security and Privacy, pp. 32-44. 9. R. J. Anderson and F. A. P. Petitcolas (2001) On the limits of the Stegnography, IEEE Journal Selected Areas in 10. Raphael, A. J., and Sundaram, V. 2011. Cryptography and Steganography - A Survey. International Journal of Computer Technology Application, 2(3), ISSN: 2229-6093, pp. 626-630. 11. S. B. Sadkhan, Cryptography: Current status and future trends, in: Proceedings of IEEE International Conference on Information & Communication Technologies: From Theory to Applications, Damascus. Syria, April 19-23, 2004, pp. 417-418. 12. T. Morkel, J. H. P. Eloff, M. S. Olivier, ”An Overview of Image Steganography”, Information and Computer Security Architecture (ICSA) Research Group, Department of Computer Science, University of Pretoria, SA.