A Crypto-Steganography: A Survey
نویسندگان
چکیده
The two important aspects of security that deal with transmitting information or data over some medium like Internet are steganography and cryptography. Steganography deals with hiding the presence of a message and cryptography deals with hiding the contents of a message. Both of them are used to ensure security. But none of them can simply fulfill the basic requirements of security i.e. the features such as robustness, undetectability and capacity etc. So a new method based on the combination of both cryptography and steganography known as Crypto-Steganography which overcome each other’s weaknesses and make difficult for the intruders to attack or steal sensitive information is being proposed. This paper also describes the basics concepts of steganography and cryptography on the basis of previous literatures available on the topic. Keywords—Steganography; Image Steganography; Cryptography; Least Significant Bit (LSB); Enhanced Least Significant Bit (ELSB); Compression; Decompression; Advanced Encryption Standard (AES); Data Encryption Standard (DES); Hashing algorithms
منابع مشابه
Pros and Cons of Cryptography, Steganography and Perturbation techniques
Cryptology was as significant as weapons during the World War II and the Cold War. There were lots of studies to develop robust crypto-systems and to use them in communications. These studies have continued up to now. Today some of those crypto-systems called as “classical crypto-systems” are improved and still being used. Mostly we can secure our data in three ways first one is cryptography wh...
متن کاملAn Approach for Message Hiding using Substitution Techniques and Audio Hiding in Steganography
A crypto system can be used to encrypt messages sent between two communicating parties so that an eavesdropper who overhears the encrypted messages will not be able to decode them. The paper mainly concentrates on the method in which the substitution technique of steganography can been used to hide data in a 24-bit bitmap file. Popular audio hiding techniques based on methods of steganography i...
متن کاملCRYPTO-STEG: A Hybrid Cryptology - Steganography Approach for Improved Data Security
Internet is a widely used medium for transfer of information due to its reach and ease of availability. However, internet is an insecure medium and any information might be easily intercepted and viewed during its transfer. Different mechanisms like cryptology and steganography are adopted to secure the data communication over an inherently insecure medium like internet. Cryptology scrambles th...
متن کاملSteganography for Radio Amateurs - A DSSS Based Approach for Slow Scan Television
In 2005, Germany introduced a new Amateur Radio Ordinance prohibiting encrypted radio traffic at home. Crypto-bans can be circumvented using steganography. However, present steganographic methods are not eligible because the embedded message will not survive the usual distortions in a radio transmission. Robust as current watermarking methods are, they leave clearly detectable traces and have a...
متن کاملData Hiding in Digital Images using Cryptography and Steganography Techniques (CryptSteg)
The two common different techniques for securing data transmission are cryptography and steganography. Steganography is not intended to replace cryptography but rather to supplement it. If a message is encrypted and hidden with a steganographic method it provides an additional layer of protection and reduces the chance of the hidden message being detected. In this paper, two layers of security ...
متن کامل