HYBRID DATA SECURITY: A REVIEW OF CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES
Abstract
As the use of computer networks and internet is ubiquitous, information security has become
sizzling area of research in recent times. Data security is very crucial in exchange of information
over computer networks because it secures the information from intruders. Although
cryptography and steganography are two popular security mechanisms that could be used to
provide data security, each of them has drawbacks. Cryptography encrypts the content of the
message thereby making it difficult for intruders to fathom. Steganography on the other hand
makes communication invisible, that is, message is embedded in a cover media in such a way that
intruders cannot detect it existence. Cryptography problem is that, the cypher text looks
meaningless, so the intruder can interrupt the transmission and use cryptanalysis to reveal the
meaning of the message. Steganography problem is that once the presence of hidden information
is revealed or even suspected, the message has become known. Therefore, effort in this paper was
directed at reviewing various types of cryptography and steganography techniques. Also, a
hybrid data security model was proposed by combining cryptography and steganography to
improve information security leveraging on the strengths of the two techniques. In the proposed
model, plain message was first encrypted using Data Encryption Standard (DES) making it
cypher text. Secondly, the encrypted message (cypher text) was hidden in an image using Least
Significant Bit (LSB) technique. The proposed model provided an enhanced data security scheme
as attacker will not be able to detect the existence of the message hidden in the image and if per
chance the message is discovered, the attacker will still not be able to make meaning of the
content because the message was encrypted
Full Text:
PDFReferences
Pallavi H. Dixit, Kamalesh B. Waskar, and Uttam L. Bombale (2015). Multilevel
Network Security Combining Cryptography and Steganography on ARM
Platform. Journal of Embedded Systems, 3, 1, 11 – 15. Doi: 10.12691/jes-3-1-2.
Marwa E. Saleh, Abdelmgeid A. Aly, Egypt Fatma A. Omara (2016). Data Security
Using Cryptography and Steganography Techniques. International Journal of
Advanced Computer Science and Applications (IJACSA). 7, 6.
Er. Babita and Er. Gurjeet Kaur (2017). A Review: Network Security Based on
Cryptography & Steganography Techniques. International Journal of Advanced
Research in Computer Science. 8, 4.
Gandharba Swain and Saroj Kumar Lankar (2011). A Quick Review of Network
Security and Steganography. International Journal of Electronics and Computer
Science Engineering†ISBN:2277-1956.
Arati Appaso Pujari and Sunita Sunil Shinde (2016). Data Security using
Cryptography and Steganography. IOSR Journal of Computer Engineering (IOSRJCE). 18 (4), 130 - 139
Divya Shree and Seema Ahlawat (2017). A review on Cryptography, Attacks and
Cyber Security. International Journal of Advanced Research in Computer Science. 8,5.
Johnson, Neil F. and Sushil Jajodia (1998). Exploring steganography: seeing the
unseen. IEEE Computer, 32,2. 26-34
HilalAlmara’beh (2016). Steganography Techniques – Data Security Using Audio
and Video, International Journal of Advanced Research in Computer Science and
Software Engineering. 6(2).
Rakhil, Suresh Gawande (2013). A Review on Steganography Methods.
International Journal of Advanced Research in Electrical, Electronics and
Instrumentation Engineering. 2(10)
https://www.clear.rice.edu/elec301/Projects01/steganosaurus/background.html
Refbacks
- There are currently no refbacks.