COMMENTS

  1. Cryptography and Steganography: New Approach

    This research paper finds a new methodology to secure text information while exchanging among permitted users over the internet. This method is a combination of cryptography and steganography with ...

  2. A Comprehensive Review on Advancements and Applications of Steganography

    Steganography, the art and science of concealing messages within other data, has a rich history spanning centuries. In this review paper, we delve into various aspects of steganography, exploring ...

  3. Comprising Survey of Steganography & Cryptography: Evaluations

    This research paper includes an in-depth analysis of existing types of cryptography and steganography techniques and recent advances to both categories in numerous modalities, most notably image and audio data. The research highlights the security improved by applying various cryptography and Steganography techniques.

  4. Review on lightweight cryptography techniques and steganography

    The hybrid of cryptography and steganography mechanisms provides enhanced security to confidential messages. ... The IoT data extraction process is discussed in this research. After the steganography process, different types of cryptanalysis were performed to gain the plain texts through this experimental process. ... Therefore this paper ...

  5. Evaluating the merits and constraints of cryptography-steganography

    In today's interconnected world, safeguarding digital data's confidentiality and security is crucial. Cryptography and steganography are two primary methods used for information security. While these methods have diverse applications, there is ongoing exploration into the potential benefits of merging them. This review focuses on journal articles from 2010 onwards and conference papers from ...

  6. (PDF) STEGANOGRAPHY: AN OVERVIEW

    Steganography, the art and science of concealing messages within other data, has a rich history spanning centuries. In this review paper, we delve into various aspects of steganography, exploring ...

  7. Double layer security using crypto-stego techniques: a comprehensive

    Further, a detailed description of commonly using evaluations parameters for both steganography and cryptography, are given in this paper. Overall, this work is an attempt to create a better understanding of image steganography and its coupling with the encryption methods for developing state of art double layer security crypto-stego systems.

  8. Steganography and Cryptography Research Papers

    This paper proposed an enhanced system for securing sensitive text-data on personal computer benefitting from the combination of both techniques: cryptography and steganography. The system security is generated by involving RSA cryptography followed by video based steganography as two sequential layers to insure best possible security gaining ...

  9. A Survey on DNA-Based Cryptography and Steganography

    This paper provides a comprehensive survey of different techniques for Deoxyribonucleic acid (DNA) -based cryptography and steganography. DNA-based cryptography is an emerging field that utilizes DNA molecules' massive parallelism and vast storage capacity to encode and decode information. The field has gained significant attention in recent years due to its potential advantages over ...

  10. PDF A Comparative Study of Steganography & Cryptography

    existence of the message and the other distorts the message itself. Many powerful & robust technologies of steganography & cryptography are developed. This paper is an attempt to analyze the steganographic & cryptographic techniques. Keywords: Steganography, Cryptography , steganalysis, cryptanalysis, stego-key 1. Introduction