HYBRID DATA SECURITY: A REVIEW OF CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES

ASANBE M.O

Abstract


As the use of computer networks and internet is ubiquitous, information security has become
sizzling area of research in recent times. Data security is very crucial in exchange of information
over computer networks because it secures the information from intruders. Although
cryptography and steganography are two popular security mechanisms that could be used to
provide data security, each of them has drawbacks. Cryptography encrypts the content of the
message thereby making it difficult for intruders to fathom. Steganography on the other hand
makes communication invisible, that is, message is embedded in a cover media in such a way that
intruders cannot detect it existence. Cryptography problem is that, the cypher text looks
meaningless, so the intruder can interrupt the transmission and use cryptanalysis to reveal the
meaning of the message. Steganography problem is that once the presence of hidden information
is revealed or even suspected, the message has become known. Therefore, effort in this paper was
directed at reviewing various types of cryptography and steganography techniques. Also, a
hybrid data security model was proposed by combining cryptography and steganography to
improve information security leveraging on the strengths of the two techniques. In the proposed
model, plain message was first encrypted using Data Encryption Standard (DES) making it
cypher text. Secondly, the encrypted message (cypher text) was hidden in an image using Least
Significant Bit (LSB) technique. The proposed model provided an enhanced data security scheme
as attacker will not be able to detect the existence of the message hidden in the image and if per
chance the message is discovered, the attacker will still not be able to make meaning of the
content because the message was encrypted


Full Text:

PDF

References


Pallavi H. Dixit, Kamalesh B. Waskar, and Uttam L. Bombale (2015). Multilevel

Network Security Combining Cryptography and Steganography on ARM

Platform. Journal of Embedded Systems, 3, 1, 11 – 15. Doi: 10.12691/jes-3-1-2.

Marwa E. Saleh, Abdelmgeid A. Aly, Egypt Fatma A. Omara (2016). Data Security

Using Cryptography and Steganography Techniques. International Journal of

Advanced Computer Science and Applications (IJACSA). 7, 6.

Er. Babita and Er. Gurjeet Kaur (2017). A Review: Network Security Based on

Cryptography & Steganography Techniques. International Journal of Advanced

Research in Computer Science. 8, 4.

Gandharba Swain and Saroj Kumar Lankar (2011). A Quick Review of Network

Security and Steganography. International Journal of Electronics and Computer

Science Engineering” ISBN:2277-1956.

Arati Appaso Pujari and Sunita Sunil Shinde (2016). Data Security using

Cryptography and Steganography. IOSR Journal of Computer Engineering (IOSRJCE). 18 (4), 130 - 139

Divya Shree and Seema Ahlawat (2017). A review on Cryptography, Attacks and

Cyber Security. International Journal of Advanced Research in Computer Science. 8,5.

Johnson, Neil F. and Sushil Jajodia (1998). Exploring steganography: seeing the

unseen. IEEE Computer, 32,2. 26-34

HilalAlmara’beh (2016). Steganography Techniques – Data Security Using Audio

and Video, International Journal of Advanced Research in Computer Science and

Software Engineering. 6(2).

Rakhil, Suresh Gawande (2013). A Review on Steganography Methods.

International Journal of Advanced Research in Electrical, Electronics and

Instrumentation Engineering. 2(10)

https://www.clear.rice.edu/elec301/Projects01/steganosaurus/background.html


Refbacks

  • There are currently no refbacks.