CFP last date
20 January 2025
Reseach Article

Article:A Survey on Cryptography and Steganography Methods for Information Security

by Kallam Ravindra Babu, Dr. S.Udaya Kumar, Dr. A.Vinaya Babu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 3
Year of Publication: 2010
Authors: Kallam Ravindra Babu, Dr. S.Udaya Kumar, Dr. A.Vinaya Babu
10.5120/1660-2235

Kallam Ravindra Babu, Dr. S.Udaya Kumar, Dr. A.Vinaya Babu . Article:A Survey on Cryptography and Steganography Methods for Information Security. International Journal of Computer Applications. 12, 3 ( December 2010), 13-17. DOI=10.5120/1660-2235

@article{ 10.5120/1660-2235,
author = { Kallam Ravindra Babu, Dr. S.Udaya Kumar, Dr. A.Vinaya Babu },
title = { Article:A Survey on Cryptography and Steganography Methods for Information Security },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 12 },
number = { 3 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 13-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume12/number3/1660-2235/ },
doi = { 10.5120/1660-2235 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:00:43.464208+05:30
%A Kallam Ravindra Babu
%A Dr. S.Udaya Kumar
%A Dr. A.Vinaya Babu
%T Article:A Survey on Cryptography and Steganography Methods for Information Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 12
%N 3
%P 13-17
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper deals with the tidings of cryptography in history, how it has played a vital role in World War -1, World War-2. It also deals with the Substitution, Transposition Cryptographic techniques and Steganography principles which can be used to maintain the confidentiality of computerized and none computerized information files.

References
  1. Der- Chyuan Lou, Nan –I Wu, Chung-Ming Wang, Zong- Han Lin, Chwei-Shyoung Tsai , “A novel adaptive Steganography based on local complexity and human vision sensitivity”, The Journal of Systems and Software 83 (2010) 1236-1248.
  2. Denning.D, “Cryptography and data security”, Addison Wesley,1982.
  3. Deavours.C.A “The black chamber: a column, how the British broke Enigma”, Cryptoloyia, 1980, 4, pp. 129 132
  4. David Khan, Mackmillan,” The code breakers: The story of secreate writing, New York:, 1967.
  5. Diffi and Hellman, ” Privacy and authentication: an introduction to cryptography”,Proceedings of the IEEE,67(1979), PP, 379-427.
  6. Fabien A.P.Petitcolas, Ross J.Anderson and Markus G. Kuhn, “Information Hiding- A Survey”, Procedings of the IEEE Special issue on protection of multimedia content, 87(7): 1062-1078, July 1999.
  7. Friedman. W, Riverbank, “Methods for the solution of running-key ciphers”, Publ. 16, Riverbank Labs., Geneva, 1918
  8. F Ayoub, “Cryptographic techniques and network security”, IEEE Proceedings, Vol.131, Dec 1984, 684-694.
  9. Kasiski. F, “Die Geheim Schriften und die Dechiflrirkunst”, Mittier and Son, 1863.
  10. Konhein. A, “Cryptography: a primer”, John Wiley, 1981.
  11. Linda S Rutledge, “A Survey of Issues in Computer Network Security”, Elsevier Science Publishers B.V North Holland, Computers and Security 5 (1986) 296-308.
  12. Lewand, R, ”Cryptological Mathematics”, Washingtone, DC: The Mathematical association of America,2000.
  13. Rivest.R,”The impact of technology on cryptography”, Proc. IEEE International Communications Conference, Toronto, Canada, June 1978.
  14. Ravindra babu Kallam, Dr.Udayakumar, “A block cipher generation using color substitution”, International Journal for Computer Applications, (0975-8887), Vol-1, No-28
  15. Ross J.Anderson, Fabien A.P.Petitcolas, “On the limits of Steganography”, IEEE Journal of selected areas in communications, 16(4): 474 – 481, May 1998.ISSN 0733-8716.
  16. Simmons, “Cryptography”, Encyclopedia Britannica, Fifteenth Edition, 1993.
  17. Sinkov, ”A Elementary Cryptanalysis: A Mathematical Approach”, Washingtone, DC: The Mathematical association of America,1996.
  18. The Beale Cipher Association,“'The Beale ciphers”, Ned field, MA, 1978
  19. Vernam. G. J, ”Cipher printing telegraph systems for secret wire and radio telegraphic communications”, AIEE, 1926, 45, pp. 109 115
  20. William Stallings, “Cryptography and Network Security”, Fifth Impression,2008, p age no: 35 – 54.
  21. www.whyiscolor.org, “ for number of colors in the world”.
  22. www.jimloy.com, “ for number of colors in the world”
  23. William Stallings, ”Cryptography and Network security” for Security attacks like -meet in the middle attack, broot force attacks p.n:353, birth day attack-p.n:350”.
Index Terms

Computer Science
Information Sciences

Keywords

Block Cipher Play Color Cryptography Encryption Decryption Decillions Homophonic Steganography HSC PSC PCC SIS Substitution Transposition