A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography

被引:11
|
作者
Varghese, Fredy [1 ,2 ]
Sasikala, P. [3 ]
机构
[1] Vinayaka Missions Kirupananda Variyar Engn Coll, Salem, Tamil Nadu, India
[2] Naipunnya Inst Management & Informat Technol, Dept Comp Sci, Trichur, Kerala, India
[3] Vinayaka Missions Kirupananda Variyar Engn Coll, Dept Math, Salem, Tamil Nadu, India
关键词
Security; Cryptography; Steganography; Advanced encryption standard (AES); Data hiding; DISCRETE WAVELET TRANSFORM; AUDIO STEGANOGRAPHY; IMAGE; ENCRYPTION; ALGORITHM;
D O I
10.1007/s11277-023-10183-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
During the last few decades, digital communication has played a vital role in various sectors such as healthcare departments, banking, information technology companies, industries, and other fields. Nowadays, all data are transmitted over the Internet, which needs high protection for transmitting the original data from source to destination. In order to secure digital communication, cryptography and steganography methods are used to achieve data security over insecure and open networks like the Internet. Cryptography is the method of encrypting secret information in an unreadable structure. Based on the cryptography method, the original message can be distorted before data transmission. On the other hand, steganography covers secret data such as audio, image, text, and video. It can hide the message while transmitting the original information from one end to another. The data combines images, texts, audio and videos, which are communicated worldwide through the Internet. This review paper gives an analysis based on the concept of cryptography and steganography. It also presents a comparative approach using several encryption algorithms with several factors such as block size, key size, encryption speed, memory usage, and security level.
引用
收藏
页码:2291 / 2318
页数:28
相关论文
共 50 条
  • [1] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Fredy Varghese
    P. Sasikala
    Wireless Personal Communications, 2023, 129 : 2291 - 2318
  • [2] An Approach of Cryptography and Steganography using Rotor cipher for secure Transmission
    Sriram, S.
    Karthikeyan, B.
    Vaithiyanathan, V.
    Raj, Anishin M. M.
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 127 - 130
  • [3] Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding
    Fredy Varghese
    P. Sasikala
    Wireless Personal Communications, 2023, 130 : 551 - 578
  • [4] Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding
    Varghese, Fredy
    Sasikala, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (01) : 551 - 578
  • [5] Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm
    Reddy, M. Indra Sena
    Kumar, A. P. Siva
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 : 62 - 69
  • [6] Secure Data Transmission Protocol based on Quantum Cryptography
    Hong, Joonmo
    Kang, BooJoong
    Kim, Hye Seon
    Chang, Peter
    Im, Eul Gyu
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11B): : 4989 - 5002
  • [7] An Efficient Secure Data Transmission Based on Visual Cryptography
    Jabi, Rubeena
    Patel, Punyaban
    Dubey, Deepty
    2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [8] Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography
    Hussain, Mehdi
    Wahab, Ainuddin Wahid Abdul
    Batool, Ishrat
    Arif, Muhammad
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (02): : 179 - 188
  • [9] Secure Communication across the Internet by Encrypting the Data using Cryptography and Image Steganography
    Rajesh, P.
    Alam, Mansoor
    Tahernezhadi, Mansour
    Kumar, T. Ravi
    Rajesh, Vikram Phaneendra
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (10) : 454 - 458
  • [10] A Secure Data Hiding Scheme Based on Combined Steganography and Visual Cryptography Methods
    Nandakumar, Aishwarya
    Harmya, P.
    Jagadeesh, Noopa
    Anju, S. S.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 498 - 505