International Journal of Exploring Emerging Trends in Engineering (IJEETE)
Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM
ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 1
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
1
Priyanka, 2
Lal Chand Panwar
Department of C.S.E, DBU University, Gobindgarh
Department of C.E UCOE, Punjabi University, Patiala
priyanka.kataria05@gmail.com, lcpanwar@yahoo.com
ABSTRACT
Security techniques such as: secrecy,
authentication, non-repudiation and integrity
control. Secrecy techniques are in two
categories: cryptography and steganography.
Steganography and cryptography is a very useful
technique to achieve secrecy in communication.
One hides the existence of the message as well as
the further distorts the message itself. By means
of cryptography, the data is transformed into
some other gibberish form and then the
encrypted data is transmitted. In steganography,
the data is embedded in an image file and the
image file is transmitted. This paper spotlights
on the potency of combining cryptography and
steganography methods to enhance the security
of communication over an open channel.
Keywords- Cryptography, Decryption,
Encryption, Steganography .
I. INTRODUCTION
Cryptography and Steganography are well
known and widely used techniques that
manipulate (change) information in order to
cipher or hide their existence respectively.
Steganography is the way of communication in
which hides the existence of the communication.
Cryptography scuttles a message so it cannot be
understood; the Steganography hides the
message so it cannot be seen. Even though both
methods offer security, a study is made to
combine both cryptography and Steganography
methods into one system for enhanced
confidentiality and security.
Cryptography systems that use a single
key is called symmetric key systems that both
the sender and the receiver have, and public-key
systems in which two keys are used, a public key
known to everyone and a abstract.
Fig 1. A Model Of Steganographic Process With
Cryptographic [1]
Classification of Cryptography and
Steganography:
Cryptography defines the sculpture and science of
transforming data into a sequence of bits that appears
as random and meaningless to a side observer or
attacker.
1. Transforming plain text to cipher text. The entire
encryption algorithms are based on two general
principles: substitution, in which each element in the
plaintext is mapped into an additional element, and
transposition, in which elements in the basic text are
rearranged. The elementary requirement is that no
information be lost.
2. Number of keys used. There are some standards
methods which are used with cryptography such as
furtive key, public key, digital signature as well as
hash function.
Secret Key (Symmetric): With secret key
cryptography, a single key is used for mutually
International Journal of Exploring Emerging Trends in Engineering (IJEETE)
Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM
ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 2
encryption and decryption. The dispatcher uses the
key to encrypt the basic text furthermore sends the
cipher text to the receiver. The receiver applies the
same key to decrypt the message and recover the
plaintext. Because a solo key is used for both
functions, secret key cryptography is moreover called
as symmetric encryption.
Public Key: Public key cryptography has been said to
be the most significant new development in
cryptography. Study described two-key crypto
system in which two parties could engage in a secure
communication over an insecure communications
channel without having to share a secret key.
Digital Signature: The use of digital signature came
from the need of ensuring the authentication. The
digital signature is further like stamp or signature of
the sender which is embedded together with the data
and encrypts it with the private key in order to send it
to the additional party. In addition, the signature
declares that any change made to the data that has
been signed is easy to detect by the receiver.
Hash Function: The hash function is a one technique
encryption, the hash function is a well-defined
process or mathematical formula that represents a
small size of bits which is generated from a bulky
sized file, the outcome of this function can be called
hash code otherwise hashes. The generating of hash
code is faster than supplementary methods which
make it more desired for authentication and integrity.
Cryptographic hash functions are to a great extent
used for digital signature and cheap constructions are
highly desirable.
3. for processing plain text.
A block cipher processes the input one block of
elements at a instance, producing an productivity
block for every input block. A stream cipher
processes the put in elements continuously,
producing output one element at a instance, as it goes
along. The proposed algorithm uses a changeover
cipher method. It is a symmetric key algorithm using
the technique of stream cipher.
STEGANOGRAPHY
The word steganography comes from the Greek
Steganos, which mean covered or secret and
graphy means writing or drawing. Therefore,
steganography [2] means, literally, covered
writing. The basic model of steganography
consists of Carrier, Message, Embedding
algorithm and Stego key. The model for
steganography is shown in Figure 2. Carrier is
also known as a cover-object, which embeds the
message and serves to hide its presence.
Since then, the steganography approaches can be
divided into three types [4]:
Fig 2. Model of Steganography
Pure Steganography: This technique simply uses
the steganography approach only without
combining other methods. It is working on
hiding information within cover carrier.
Secret Key Steganography: The secret key
steganography use the combination of the secret
key cryptography technique and the
steganography approach. The idea of this type is
to encrypt the secret message or data by secret
key approach and to hide the encrypted data
within cover carrier.
Public Key Steganography: The last type of
steganography is to combine the public key
cryptography approach and the [6]
steganography approach. The idea of this type is
to encrypt the secret data using the public key
approach and then hide the encrypted data within
cover carrier.
International Journal of Exploring Emerging Trends in Engineering (IJEETE)
Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM
ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 3
II. PROPOSED APPROACH
Basically, the purpose of cryptography
and steganography is to provide secret
communication. Steganography [5] is:” Hiding a
secret message within a larger one in such a way
that others cannot discern the presence or
contents of the hidden message” and
Cryptography is “The process or skill of
communicating in, or deciphering secret writing
or ciphers.” Steganography can be used to cloak
hidden messages in image, audio and even text
files. Now, it is gaining new popularity with the
current industry demands for digital
watermarking and fingerprinting of audio and
video. Steganography deceived with
cryptography, where we transform the message
so as to make its meaning cryptic to malicious
people who block it. Therefore, the definition of
breaking the system is different. In cryptography,
the system is broken when the attacker can read
the secret message. Breaking a steganography
system needs the attacker to detect that
steganography [3] has been used and he is able to
read the embedded message. In addition, the
security of classical steganography system relies
on secrecy of the data encoding system. Once the
encoding system is known, the steganography
system is defeated. The distinction between
cryptography and steganography is an important
one, and is summarized by the following table.
Steganography Cryptography
Unknown Message
passing.
known Message
passing.
Steganography
Prevents discovery of
the very Existence of
Communication.
Encryption prevents
An Authorized party
from Discovering The
Contents of a
communication.
Little Known
Technology.
Common Technology.
Technology still Being
Developed for Certain
Formats.
Most Of The
Algorithms Known by
All.
Once Detected
message is known.
Strong Current
Algorithms are
Currently resistant to
Attack. Large Amount
of Computing power is
Required For
Cracking.
Steganography does
not Alter the Structure
Of the secret Message.
Cryptography does not
Alter the Structure Of
the secret Message.
Steganography can be
used in conjunction
with cryptography by
hiding an encrypted
message.
Steganography [8]
cannot be used to adapt
the Robustness of
cryptographic System.
The End Result of
Information Hiding Is
Stego Image.
The End of Result is
Cryptography is
ciphertext.
Table1.Comparison
COMBINED CRYPTO-STEGANOGRAPHY
Steganography is not the same as cryptography
Data hiding techniques have been widely used to
transmission of hiding secret message for long
time. Ensuring data security is a big challenge
for computer users. Business men, professionals,
and home users all have some important data that
they want to secure from others. Even though
both methods provide security, to add multiple
layers of security it is always a good practice to
use Cryptography and Steganography [7]
together. By combining, the data encryption can
be done by a software and then embed the cipher
text in an image or any other media with the help
of stego key. The combination of these two
methods will enhance the security of the data
embedded. This combined chemistry will satisfy
the requirements such as capacity, security and
robustness for secure data transmission over an
open channel. A pictorial representation of the
combined concept of cryptography and
steganography is depicted in figure 2.
International Journal of Exploring Emerging Trends in Engineering (IJEETE)
Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM
ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 4
Fig 3.Combination of steganography and
Cryptography
In figure 3, both the methods are combined by
encrypting message with cryptography and then
covering the encrypted message using
steganography [9]. The Concluding Stego-image
can be pass on without affirming that secret
information is being changed. If an attacker want
to break the steganographic technique to detect
the message from the stego-object, he would still
require the cryptographic decoding key to
decipher the encrypted message.
III. CONCLUSION
We presented a classification of network security
techniques. We gave emphasis on steganography
techniques. Steganography and cryptography are
very suitable technique to achieve secrecy in
communication. If both the techniques:
cryptography and steganography is used then the
communication becomes double secured.
IV. REFERENCES
[1] Neha Sharma, J.S. Bhatia and Dr. Neena
Gupta, “An Encrypto-Stego Technique Based
secure data Transmission System”, PEC,
Chandigarh.
[2] I. Venkata Sai Manoj, “Cryptography and
Steganography”, International Journal of
Computer Applications (0975 – 8887), Volume 1
– No.12
[3] Alan Siper, Roger Farley and Craig
Lombardo, “The Rise of Steganography”,
Proceedings of Student/Faculty Research Day,
CSIS, Pace University, May 6th, 2005.
[4] B B Zaidan, A.A Zaidan, A.K. Al-Frajat and
H.A. Jalab, “On the Differences between Hiding
Information and Cryptography Techniques: An
Overview”, Journal of Applied Sciences 10(15):
1650-1655, 2010
[5] Domenico Bloisi and Luca Iocchi, “Image
Based Steganography and Cryptography”,
Sapienza University of Rome, Italy.
[6] Kallam Ravindra Babu, Dr. S.Udaya Kumar,
r. A.Vinaya Babu, “A Survey on Cryptography
and Steganography Methods for Information
Security”, Internaltional Journal of Computer
Applications (0975-8887), Volume 12 – No. 2,
November 2010.
[7] Dipti Kapoor Sarmah, Neha bajpai, “
Proposed System for Data Hiding Using
Cryptography and Steganography”, International
Journal of Computer Applications (0975 –
8887), Volume 8 – No. 9, October 2010.
[8] Eiji Kawaguchi and Richard O. Eason,
“Principle and applications of BPCS-
Steganography”, Kyushu Institute of
Technology, Kitakyushu, Japan, University of
Maine, Orono, Maine 04469-5708.
[9]Sashikala Channalli and Ajay Jadhav,
“Steganography An Art of Hiding Data”,
International Journal on Computer Science and
Engineering Vol.1 (3), 2009, 137-141.
AUTHOR’S BIBLOGRAPHY
Priyanka, pursuing her M.tech in
Computer Engineering from
UCOE, Punjabi University Patiala
and currently working as Lecturer
in Computer Science And
Engineering, Desh Bhagat
University , Mandi Gobindgarh.
Lal Chand Panwar pursuing his
Ph.D. in Computer Engineering
from UCOE, Punjabi University
Patiala and currently working as
Assistant Professor in Computer
Engineering from UCOE, Punjabi
University Patiala.

More Related Content

PDF
Paper id 27201444
 
PDF
H017255560
PDF
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
PDF
C01111519
PDF
An Overview of Steganography
PDF
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
PPTX
Cn ppt
PDF
319 325
Paper id 27201444
 
H017255560
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
C01111519
An Overview of Steganography
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
Cn ppt
319 325

Similar to ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY (20)

PDF
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
PDF
Analysis of Different Steganography Algorithms and Security Issues
PDF
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
PDF
N45028390
PDF
Feature Selection Algorithm for Supervised and Semisupervised Clustering
PDF
Steganography using Interpolation and LSB with Cryptography on Video Images -...
PDF
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
PDF
Review paper on Data Security using Cryptography and Steganography
PDF
Data security using stegnography and quantum cryptography
DOCX
A Review on - Data Hiding using Cryptography and Steganography
PDF
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
PDF
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
PDF
Privacy Enhanced Online Payment System
PDF
Comparative study of private and public key cryptography algorithms a survey
PPTX
About Steganography
PDF
Public key cryptography
PDF
A Survey on Generation and Evolution of Various Cryptographic Techniques
PDF
Analysis of Cryptography Techniques
PDF
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
Analysis of Different Steganography Algorithms and Security Issues
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
N45028390
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Review paper on Data Security using Cryptography and Steganography
Data security using stegnography and quantum cryptography
A Review on - Data Hiding using Cryptography and Steganography
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTS
Privacy Enhanced Online Payment System
Comparative study of private and public key cryptography algorithms a survey
About Steganography
Public key cryptography
A Survey on Generation and Evolution of Various Cryptographic Techniques
Analysis of Cryptography Techniques
Performance Comparison of File Security System using TEA and Blowfish Algorithms
 
Ad

More from Asia Smith (20)

PDF
PPT - Custom Term Paper PowerPoint Presentation, Free Dow
PDF
PPT - Expository Text PowerPoint Presentation, F
PDF
Writing A Motivational Letter Outlet Discounts, Save 64
PDF
6 Ways To Write A Brief Description Of Yourself - Wi
PDF
Ant Writing Royalty Free Stock Images - Image 158
PDF
Ice Cream Paper Teacher Created Resources, Superki
PDF
Work Experience Essay - GCSE English - Marked B
PDF
Formal Letter Format Useful Example And Writing Tips
PDF
The Importance Of Writing Cafeviena.Pe
PDF
The 9 Best College Essay Writing Services In 2023 R
PDF
Music Training Material - English For Research Paper Writing - St
PDF
Free Speech Examples For Students To Craft A Best S
PDF
Sample Essay About Career Goals
PDF
015 Editorial V Essay Thatsnotus
PDF
Analytical Rubrics Essays - Writefiction
PDF
Short Story Writing Process Chart Writing Short Storie
PDF
Writing Paper Fichrios Decorados, Papis De Escri
PDF
Santa Letterhead Printable - Inspiration Made Simple
PDF
Scroll Templates, Writing Practic
PDF
Synthesis Essay Help What Is A Synthesis P
PPT - Custom Term Paper PowerPoint Presentation, Free Dow
PPT - Expository Text PowerPoint Presentation, F
Writing A Motivational Letter Outlet Discounts, Save 64
6 Ways To Write A Brief Description Of Yourself - Wi
Ant Writing Royalty Free Stock Images - Image 158
Ice Cream Paper Teacher Created Resources, Superki
Work Experience Essay - GCSE English - Marked B
Formal Letter Format Useful Example And Writing Tips
The Importance Of Writing Cafeviena.Pe
The 9 Best College Essay Writing Services In 2023 R
Music Training Material - English For Research Paper Writing - St
Free Speech Examples For Students To Craft A Best S
Sample Essay About Career Goals
015 Editorial V Essay Thatsnotus
Analytical Rubrics Essays - Writefiction
Short Story Writing Process Chart Writing Short Storie
Writing Paper Fichrios Decorados, Papis De Escri
Santa Letterhead Printable - Inspiration Made Simple
Scroll Templates, Writing Practic
Synthesis Essay Help What Is A Synthesis P
Ad

Recently uploaded (20)

PDF
CRP102_SAGALASSOS_Final_Projects_2025.pdf
PDF
Journal of Dental Science - UDMY (2020).pdf
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
Module on health assessment of CHN. pptx
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PPTX
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
International_Financial_Reporting_Standa.pdf
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PPTX
Education and Perspectives of Education.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
Climate and Adaptation MCQs class 7 from chatgpt
CRP102_SAGALASSOS_Final_Projects_2025.pdf
Journal of Dental Science - UDMY (2020).pdf
Share_Module_2_Power_conflict_and_negotiation.pptx
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Module on health assessment of CHN. pptx
Hazard Identification & Risk Assessment .pdf
Unit 4 Computer Architecture Multicore Processor.pptx
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Introduction to pro and eukaryotes and differences.pptx
International_Financial_Reporting_Standa.pdf
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
FORM 1 BIOLOGY MIND MAPS and their schemes
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
Education and Perspectives of Education.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Climate and Adaptation MCQs class 7 from chatgpt

ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY

  • 1. International Journal of Exploring Emerging Trends in Engineering (IJEETE) Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 1 ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY 1 Priyanka, 2 Lal Chand Panwar Department of C.S.E, DBU University, Gobindgarh Department of C.E UCOE, Punjabi University, Patiala [email protected], [email protected] ABSTRACT Security techniques such as: secrecy, authentication, non-repudiation and integrity control. Secrecy techniques are in two categories: cryptography and steganography. Steganography and cryptography is a very useful technique to achieve secrecy in communication. One hides the existence of the message as well as the further distorts the message itself. By means of cryptography, the data is transformed into some other gibberish form and then the encrypted data is transmitted. In steganography, the data is embedded in an image file and the image file is transmitted. This paper spotlights on the potency of combining cryptography and steganography methods to enhance the security of communication over an open channel. Keywords- Cryptography, Decryption, Encryption, Steganography . I. INTRODUCTION Cryptography and Steganography are well known and widely used techniques that manipulate (change) information in order to cipher or hide their existence respectively. Steganography is the way of communication in which hides the existence of the communication. Cryptography scuttles a message so it cannot be understood; the Steganography hides the message so it cannot be seen. Even though both methods offer security, a study is made to combine both cryptography and Steganography methods into one system for enhanced confidentiality and security. Cryptography systems that use a single key is called symmetric key systems that both the sender and the receiver have, and public-key systems in which two keys are used, a public key known to everyone and a abstract. Fig 1. A Model Of Steganographic Process With Cryptographic [1] Classification of Cryptography and Steganography: Cryptography defines the sculpture and science of transforming data into a sequence of bits that appears as random and meaningless to a side observer or attacker. 1. Transforming plain text to cipher text. The entire encryption algorithms are based on two general principles: substitution, in which each element in the plaintext is mapped into an additional element, and transposition, in which elements in the basic text are rearranged. The elementary requirement is that no information be lost. 2. Number of keys used. There are some standards methods which are used with cryptography such as furtive key, public key, digital signature as well as hash function. Secret Key (Symmetric): With secret key cryptography, a single key is used for mutually
  • 2. International Journal of Exploring Emerging Trends in Engineering (IJEETE) Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 2 encryption and decryption. The dispatcher uses the key to encrypt the basic text furthermore sends the cipher text to the receiver. The receiver applies the same key to decrypt the message and recover the plaintext. Because a solo key is used for both functions, secret key cryptography is moreover called as symmetric encryption. Public Key: Public key cryptography has been said to be the most significant new development in cryptography. Study described two-key crypto system in which two parties could engage in a secure communication over an insecure communications channel without having to share a secret key. Digital Signature: The use of digital signature came from the need of ensuring the authentication. The digital signature is further like stamp or signature of the sender which is embedded together with the data and encrypts it with the private key in order to send it to the additional party. In addition, the signature declares that any change made to the data that has been signed is easy to detect by the receiver. Hash Function: The hash function is a one technique encryption, the hash function is a well-defined process or mathematical formula that represents a small size of bits which is generated from a bulky sized file, the outcome of this function can be called hash code otherwise hashes. The generating of hash code is faster than supplementary methods which make it more desired for authentication and integrity. Cryptographic hash functions are to a great extent used for digital signature and cheap constructions are highly desirable. 3. for processing plain text. A block cipher processes the input one block of elements at a instance, producing an productivity block for every input block. A stream cipher processes the put in elements continuously, producing output one element at a instance, as it goes along. The proposed algorithm uses a changeover cipher method. It is a symmetric key algorithm using the technique of stream cipher. STEGANOGRAPHY The word steganography comes from the Greek Steganos, which mean covered or secret and graphy means writing or drawing. Therefore, steganography [2] means, literally, covered writing. The basic model of steganography consists of Carrier, Message, Embedding algorithm and Stego key. The model for steganography is shown in Figure 2. Carrier is also known as a cover-object, which embeds the message and serves to hide its presence. Since then, the steganography approaches can be divided into three types [4]: Fig 2. Model of Steganography Pure Steganography: This technique simply uses the steganography approach only without combining other methods. It is working on hiding information within cover carrier. Secret Key Steganography: The secret key steganography use the combination of the secret key cryptography technique and the steganography approach. The idea of this type is to encrypt the secret message or data by secret key approach and to hide the encrypted data within cover carrier. Public Key Steganography: The last type of steganography is to combine the public key cryptography approach and the [6] steganography approach. The idea of this type is to encrypt the secret data using the public key approach and then hide the encrypted data within cover carrier.
  • 3. International Journal of Exploring Emerging Trends in Engineering (IJEETE) Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 3 II. PROPOSED APPROACH Basically, the purpose of cryptography and steganography is to provide secret communication. Steganography [5] is:” Hiding a secret message within a larger one in such a way that others cannot discern the presence or contents of the hidden message” and Cryptography is “The process or skill of communicating in, or deciphering secret writing or ciphers.” Steganography can be used to cloak hidden messages in image, audio and even text files. Now, it is gaining new popularity with the current industry demands for digital watermarking and fingerprinting of audio and video. Steganography deceived with cryptography, where we transform the message so as to make its meaning cryptic to malicious people who block it. Therefore, the definition of breaking the system is different. In cryptography, the system is broken when the attacker can read the secret message. Breaking a steganography system needs the attacker to detect that steganography [3] has been used and he is able to read the embedded message. In addition, the security of classical steganography system relies on secrecy of the data encoding system. Once the encoding system is known, the steganography system is defeated. The distinction between cryptography and steganography is an important one, and is summarized by the following table. Steganography Cryptography Unknown Message passing. known Message passing. Steganography Prevents discovery of the very Existence of Communication. Encryption prevents An Authorized party from Discovering The Contents of a communication. Little Known Technology. Common Technology. Technology still Being Developed for Certain Formats. Most Of The Algorithms Known by All. Once Detected message is known. Strong Current Algorithms are Currently resistant to Attack. Large Amount of Computing power is Required For Cracking. Steganography does not Alter the Structure Of the secret Message. Cryptography does not Alter the Structure Of the secret Message. Steganography can be used in conjunction with cryptography by hiding an encrypted message. Steganography [8] cannot be used to adapt the Robustness of cryptographic System. The End Result of Information Hiding Is Stego Image. The End of Result is Cryptography is ciphertext. Table1.Comparison COMBINED CRYPTO-STEGANOGRAPHY Steganography is not the same as cryptography Data hiding techniques have been widely used to transmission of hiding secret message for long time. Ensuring data security is a big challenge for computer users. Business men, professionals, and home users all have some important data that they want to secure from others. Even though both methods provide security, to add multiple layers of security it is always a good practice to use Cryptography and Steganography [7] together. By combining, the data encryption can be done by a software and then embed the cipher text in an image or any other media with the help of stego key. The combination of these two methods will enhance the security of the data embedded. This combined chemistry will satisfy the requirements such as capacity, security and robustness for secure data transmission over an open channel. A pictorial representation of the combined concept of cryptography and steganography is depicted in figure 2.
  • 4. International Journal of Exploring Emerging Trends in Engineering (IJEETE) Vol. 02, Issue 01, JAN, 2015 WWW.IJEETE.COM ISSN – 2394-0573 All Rights Reserved © 2014 IJEETE Page 4 Fig 3.Combination of steganography and Cryptography In figure 3, both the methods are combined by encrypting message with cryptography and then covering the encrypted message using steganography [9]. The Concluding Stego-image can be pass on without affirming that secret information is being changed. If an attacker want to break the steganographic technique to detect the message from the stego-object, he would still require the cryptographic decoding key to decipher the encrypted message. III. CONCLUSION We presented a classification of network security techniques. We gave emphasis on steganography techniques. Steganography and cryptography are very suitable technique to achieve secrecy in communication. If both the techniques: cryptography and steganography is used then the communication becomes double secured. IV. REFERENCES [1] Neha Sharma, J.S. Bhatia and Dr. Neena Gupta, “An Encrypto-Stego Technique Based secure data Transmission System”, PEC, Chandigarh. [2] I. Venkata Sai Manoj, “Cryptography and Steganography”, International Journal of Computer Applications (0975 – 8887), Volume 1 – No.12 [3] Alan Siper, Roger Farley and Craig Lombardo, “The Rise of Steganography”, Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 6th, 2005. [4] B B Zaidan, A.A Zaidan, A.K. Al-Frajat and H.A. Jalab, “On the Differences between Hiding Information and Cryptography Techniques: An Overview”, Journal of Applied Sciences 10(15): 1650-1655, 2010 [5] Domenico Bloisi and Luca Iocchi, “Image Based Steganography and Cryptography”, Sapienza University of Rome, Italy. [6] Kallam Ravindra Babu, Dr. S.Udaya Kumar, r. A.Vinaya Babu, “A Survey on Cryptography and Steganography Methods for Information Security”, Internaltional Journal of Computer Applications (0975-8887), Volume 12 – No. 2, November 2010. [7] Dipti Kapoor Sarmah, Neha bajpai, “ Proposed System for Data Hiding Using Cryptography and Steganography”, International Journal of Computer Applications (0975 – 8887), Volume 8 – No. 9, October 2010. [8] Eiji Kawaguchi and Richard O. Eason, “Principle and applications of BPCS- Steganography”, Kyushu Institute of Technology, Kitakyushu, Japan, University of Maine, Orono, Maine 04469-5708. [9]Sashikala Channalli and Ajay Jadhav, “Steganography An Art of Hiding Data”, International Journal on Computer Science and Engineering Vol.1 (3), 2009, 137-141. AUTHOR’S BIBLOGRAPHY Priyanka, pursuing her M.tech in Computer Engineering from UCOE, Punjabi University Patiala and currently working as Lecturer in Computer Science And Engineering, Desh Bhagat University , Mandi Gobindgarh. Lal Chand Panwar pursuing his Ph.D. in Computer Engineering from UCOE, Punjabi University Patiala and currently working as Assistant Professor in Computer Engineering from UCOE, Punjabi University Patiala.