Pros and Cons of Cryptography, Steganography and Perturbation techniques
نویسندگان
چکیده
Cryptology was as significant as weapons during the World War II and the Cold War. There were lots of studies to develop robust crypto-systems and to use them in communications. These studies have continued up to now. Today some of those crypto-systems called as “classical crypto-systems” are improved and still being used. Mostly we can secure our data in three ways first one is cryptography where content of the message is kept secret by encoding it, secondly Steganography where the message is embedded in another medium, third perturbation technique which performs some operation on actual data so that its actual meaning is not obvious/disclosed.Here we have a comparative study on cryptography, steganography and perturbation technique with pros and cons of each.
منابع مشابه
Data Security with Image Clustering using Steganography
Steganography is art of invisible Communication. It strives to hide the existence of communicated message in appropriate medium i.e. Image, Audio or Video. So as not to arouse an eavesdropper’s suspicion. Various techniques with Objectives of robustness, Payload and Undetectability are available and have their respective pros and cons. Various Steganography Techniques are employed depending on ...
متن کاملStudy on Image Steganography Techniques
Steganography is a secret Communication to hide the secret Data. It is an invisible communication that hides data like text, image, and audio, video etc .The secret message is inserted into the image files. The image files can use stego-key to hide the data and the resultant image is called as stego-image. This is most important for the internet users to share their secret data in an efficient ...
متن کاملSecret Information Steganography Using LSB Insertion Methodwithout Bit Layout Section with Increasing Substitution Rate and High Reliability
In this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (Steganography). Data is encrypted bytwo methods before embedding to increase reliability. Then they are embedded into the imageby a button, a method has been expressed to reduce potential noise impact on the wayinformation is encoded.
متن کاملSteganographic Techniques of Data Hiding using Digital Images
Steganography is an art that involves communication of secret data in an appropriate carrier, e.g., image, audio, video or TCP/IP header file. Steganography’s goal is to hide the very existence of embedded data so as not to arouse an eavesdropper’s suspicion. For hiding secret data in digital images, large varieties of steganographic techniques are available, some are more complex than others, ...
متن کاملCompensatory Efforts; A Critique of the Pros and Cons
Compensatory efforts, positive discrimination or reverse discrimination are the terms which nowadays are used in applied ethics for a set of efforts and privileges which are scheduled for compensation of the historical oppressions and discriminations imposed upon some groups and classes in the society. The mentioned oppressions and discriminations may be applied deliberately or inadvertently or...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015