We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Article:Security Enhancement: Combining Cryptography and Steganography

by Dhawal Seth, L. Ramanathan, Abhishek Pandey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 9 - Number 11
Year of Publication: 2010
Authors: Dhawal Seth, L. Ramanathan, Abhishek Pandey
10.5120/1433-1932

Dhawal Seth, L. Ramanathan, Abhishek Pandey . Article:Security Enhancement: Combining Cryptography and Steganography. International Journal of Computer Applications. 9, 11 ( November 2010), 3-6. DOI=10.5120/1433-1932

@article{ 10.5120/1433-1932,
author = { Dhawal Seth, L. Ramanathan, Abhishek Pandey },
title = { Article:Security Enhancement: Combining Cryptography and Steganography },
journal = { International Journal of Computer Applications },
issue_date = { November 2010 },
volume = { 9 },
number = { 11 },
month = { November },
year = { 2010 },
issn = { 0975-8887 },
pages = { 3-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume9/number11/1433-1932/ },
doi = { 10.5120/1433-1932 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:58:29.393622+05:30
%A Dhawal Seth
%A L. Ramanathan
%A Abhishek Pandey
%T Article:Security Enhancement: Combining Cryptography and Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 9
%N 11
%P 3-6
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In today’s world of high technology, it is not safe to share confidential and important data on any network. Intruders are always in wake of it. They hack the data and use it for their benefit. These malicious people try to gain benefit, get attention, or to harm someone. In either case, message sender or receiver has to pay the price. To avoid these undesirable acts, Steganography and cryptography are used together to ensure security of the covert and secure message. One of the most efficient and secure algorithms is Data Encryption Standard (DES). Steganography is the art and science of writing hidden messages in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden message.

References
  1. Anderson, R.J. & Petitcolas, F.A.P., “On the limits of Steganography”, IEEE Journal of selected Areas in Communications, May 1998.
  2. Applied Cryptography, Second Edition - John Wiley & Sons, Bruce Schneier.
  3. Communication networks: fundamental concepts and key architectures - Alberto León-García, Indra Widjaja.
  4. Davies, D.W.; W.L. Price (1989). Security for computer networks, 2nd edition John Wiley & Sons.
  5. Digital Steganography: Hiding Data within Data- Artz, D.; Los Alamos Nat. Lab., NM.
  6. Introduction to Cryptography – Ranjan Bose – Tata Mc-Grew– hill Publisher ltd, 2001.
  7. Jamil, T., “Steganography: The art of hiding information is plain sight”, IEEE Potentials, 18:01, 1999.
  8. Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998.
  9. Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science.
  10. R. L. Rivest, A. Shamir, L. Adleman. A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM 21, 2 (Feb, 1978), 120-126.
  11. Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Encryption Decryption Steganography Cipher text