We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Metamorphic Cryptography

by Namrata Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 3
Year of Publication: 2018
Authors: Namrata Singh
10.5120/ijca2018917489

Namrata Singh . Metamorphic Cryptography. International Journal of Computer Applications. 182, 3 ( Jul 2018), 30-34. DOI=10.5120/ijca2018917489

@article{ 10.5120/ijca2018917489,
author = { Namrata Singh },
title = { Metamorphic Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2018 },
volume = { 182 },
number = { 3 },
month = { Jul },
year = { 2018 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number3/29744-2018917489/ },
doi = { 10.5120/ijca2018917489 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:10:17.828115+05:30
%A Namrata Singh
%T Metamorphic Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 3
%P 30-34
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today's digital world the ways communication are getting better day by day which in turn giving rise to one major problem which is the security of the data transmission, for protecting the secret information from the intruder the existence of the data should be hidden from others for increasing the security we can also make the secret data unreadable which can be done by using various steganographic techniques along with the cryptographic techniques. Steganography hides the existence of the information whereas cryptography makes the data unreadable making the communication robust.

References
  1. Cryptography and Steganography – A Survey, A. Joseph Raphael, Dr. V. Sundaram, A.Joseph Raphael,Dr.V Sundaram, Int. J. Comp. Tech. Appl., Vol 2 (3), 626-630
  2. A Crypto-Steganography: A Survey, Md. Khalid Imam Rahmani, Kamiya Arora, Naina Pal, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 5, No. 7, 2014
  3. A Survey on various types of Steganography and Analysis of Hiding Techniques, Navneet Kaur, Sunny Behal, International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 8 - May 2014
  4. A Survey on Novel Visual Cryptographic Steganography Techniques, Shailendra M. Pardeshi, International Journal of Computer Applications (0975 – 8887) National Conference on Emerging Trends in Information Technology (NCETIT-2014)
  5. A Survey on Cryptography and Steganography, Niveditha R, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064
  6. A Survey Paper on Steganography and Cryptography, Z. V. Patel, S. A. Gadhiya, RESEARCH HUB – International Multidisciplinary Research Journal (RHIMRJ) Volume-2, Issue-5, May-2015 ISSN: 2349-7637 (Online)
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Steganography Crypto-Steganography.