Pros and Cons of Cryptography, Steganography and Perturbation techniques

نویسندگان

  • Haripriya Rout
  • Kishore Mishra
چکیده

Cryptology was as significant as weapons during the World War II and the Cold War. There were lots of studies to develop robust crypto-systems and to use them in communications. These studies have continued up to now. Today some of those crypto-systems called as “classical crypto-systems” are improved and still being used. Mostly we can secure our data in three ways first one is cryptography where content of the message is kept secret by encoding it, secondly Steganography where the message is embedded in another medium, third perturbation technique which performs some operation on actual data so that its actual meaning is not obvious/disclosed.Here we have a comparative study on cryptography, steganography and perturbation technique with pros and cons of each.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Security with Image Clustering using Steganography

Steganography is art of invisible Communication. It strives to hide the existence of communicated message in appropriate medium i.e. Image, Audio or Video. So as not to arouse an eavesdropper’s suspicion. Various techniques with Objectives of robustness, Payload and Undetectability are available and have their respective pros and cons. Various Steganography Techniques are employed depending on ...

متن کامل

Study on Image Steganography Techniques

Steganography is a secret Communication to hide the secret Data. It is an invisible communication that hides data like text, image, and audio, video etc .The secret message is inserted into the image files. The image files can use stego-key to hide the data and the resultant image is called as stego-image. This is most important for the internet users to share their secret data in an efficient ...

متن کامل

Secret Information Steganography Using LSB Insertion Methodwithout Bit Layout Section with Increasing Substitution Rate and High Reliability

In this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (Steganography). Data is encrypted bytwo methods before embedding to increase reliability. Then they are embedded into the imageby a button, a method has been expressed to reduce potential noise impact on the wayinformation is encoded.

متن کامل

Steganographic Techniques of Data Hiding using Digital Images

Steganography is an art that involves communication of secret data in an appropriate carrier, e.g., image, audio, video or TCP/IP header file. Steganography’s goal is to hide the very existence of embedded data so as not to arouse an eavesdropper’s suspicion. For hiding secret data in digital images, large varieties of steganographic techniques are available, some are more complex than others, ...

متن کامل

Compensatory Efforts; A Critique of the Pros and Cons

Compensatory efforts, positive discrimination or reverse discrimination are the terms which nowadays are used in applied ethics for a set of efforts and privileges which are scheduled for compensation of the historical oppressions and discriminations imposed upon some groups and classes in the society. The mentioned oppressions and discriminations may be applied deliberately or inadvertently or...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015