Asian Journal of Computer Science and Technology (AJCST)
A Survey of Different Steganography Technique using Cryptographic AlgorithmAuthor : Prakhar Agrawal and Arvind Upadhyay
Volume 7 No.2 July-September 2018 pp 40-43
Steganography and cryptography are two major aspects of data security . In this paper we are going to provide the survey of different techniques of LSB based Steganography that used cryptography algorithms to secure sensitive information. Steganography is used to hide data and Cryptography is used to encrypt the data. Although cryptography and steganography individually can provide data security, every of them has a drawback. Drawback associated with Cryptography is that, the cipher text looks meaningless, so the unintended user can interrupt the transmission or make more careful checks on the information from the sender to the receiver. Drawback associated with Steganography is that when the presence of hidden information is revealed or even suspected, the message is become known.By combining these two methods we can solve both of the above problem. First we encrypt the data using any cryptography technique and then embed the encrypted text into the image. Steganography is the process which hides the presence of secure data during communication. On the other hand cryptography is encrypting and decrypting of secure data and information with a secrete key so that no one can be understand the message directly.
Steganography, Images, Cryptography, ECDH, RSA, Security, Data hiding, communication Channel
 A. A. Pujari and S. S. Shinde, “Data Security Using Cryptography and Steganography Techniques”, IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 18, No. 4, pp. 130-139, 2016.
 H. Abdulzahra, R. Ahmad1 and N. M. Noor, “Combining Cryptography and Steganography for Data Hiding in Images”, International conference on applied computer and applied computational science (ACACOS’ 14), pp. 128-134, 2014.
 N. D. Jambhekar and C. A. Dhawale, “The Act of Steganography from Ancient Era to Digital Age”, IJCA Proceedings on National Conference on Knowledge, Innovation in Technology and Engineering, NCKITE-2015, pp. 1-4.
 M. Pavani, S. Naganjaneyulu and C. Nagaraju, “A Survey on LSB Based Steganography Methods”, International Journal Of Engineering And Computer Science, Vol. 2, No. 8, pp. 2464-2467, 2013.
 M. Saritha, M. Vishwanath Khadabadi and M. Sushravya, “Image and text steganography with cryptography using MATLAB”, In Signal Processing, Communication, Power and Embedded System (SCOPES), 2016 International Conference on IEEE,, pp. 584-5872016.
 Dhamija, Ankit, and Vijay Dhaka. “A novel cryptographic and steganographic approach for secure cloud data migration”, In Green
Computing and Internet of Things (ICGCIoT),International Conference on IEEE, 2015, pp. 346-351, 2015.
 Atee, Hayfaa Abdulzahra, Robiah Ahmad and Norliza Mohd Noor. “Cryptography and Image Steganography Using Dynamic Encryption on LSB and Color Image Based Data Hiding”, Middle-East Journal of Scientific Research, Vol. 23, No. 7, pp. 1450-1460, 2015.
 Sankar Roy and Ranjan Parekh, “A secure keyless image steganography approach for lossless RGB images”, In Proceedings of the 2011 International Conference on Communication, Computing & Security, pp. 573-576. ACM, 2011.
 Samima, Shabnam, Ratnakirti Roy and Suvamoy Changder, “Secure key based image realization steganography”, In Image Information Processing (ICIIP), 2013 IEEE Second International Conference on IEEE, pp. 377-382, 2013.
 Md. R. Islam, A. Siddiqa, Md. P. Uddin, A. K. Mandal and Md. D. Hossain, “An Efficient Filtering Based Approach Improving LSB Image Steganography using Status Bit along with AES Cryptography”, International Conference on Informatics, Electronics & Vision, pp. 1-6, 2014.
 D. Baby, J. Thomas, G. Augustine, E. George and N. R. Michael, “A Novel DWT based Image Securing Method using Steganography”, Procedia Computer Science, Vol. 46, pp. 612-618, 2015.
 S Hemalatha, U. D. Acharya and A. Renuka, “Wavelet transform based steganography technique to hide audio signals in image”, Procedia Computer Science, Vol. 47, pp. 272 – 281, 2015.