Cryptography and Steganography
نویسنده
چکیده
Cryptography and steganography, the art of transforming the code or the plain text into either the encrypted code or a pictures format, as used by the steganographic feature, is the matter of great deal in the modern world of the ruler "security". Everyone in the entire scenario now emphasizes the need for cryptography and steganography codegroup utility which encodes and decodes binary files into five-letter code groups just like secret agents use. Handy for sending small binary messages by telephone, radio, or telegraph. Here, we discuss about the action and power of cryptography and its secured performance, hence data security.
منابع مشابه
Secret Information Steganography Using LSB Insertion Methodwithout Bit Layout Section with Increasing Substitution Rate and High Reliability
In this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (Steganography). Data is encrypted bytwo methods before embedding to increase reliability. Then they are embedded into the imageby a button, a method has been expressed to reduce potential noise impact on the wayinformation is encoded.
متن کاملThe Idea Of Using The Steganography As Encryption Tool
the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...
متن کاملOptimizing image steganography by combining the GA and ICA
In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...
متن کاملA Quick review of Network Security and Steganography
In this paper we present a classification of network security techniques such as: secrecy, authentication, non-repudiation and integrity control. The secrecy techniques are two categories: cryptography and steganography. Steganography like cryptography is a very useful technique to achieve secrecy in communication. If both cryptography and steganography are used then the communication becomes t...
متن کاملImage based steganography and cryptography
In this paper we describe a method for integrating together cryptography and steganography through image processing. In particular, we present a system able to perform steganography and cryptography at the same time using images as cover objects for steganography and as keys for cryptography. We will show such system is an effective steganographic one (making a comparison with the well known F5...
متن کاملAn Effective Way of using LSB Steganography in images along with Cryptography
Hiding data is a very important thing nowadays as the data travels over various unsecure networks. To avoid this problem cryptography is used which hides the data or scrambles your message, but cryptography alone cannot provide total security as the message is still available to perform cryptanalysis. Steganography hides the existence of the message. Most of the peoples use either cryptography ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010