Professional Documents
Culture Documents
A Study-To Combined Cryptography and Steganography Methods: Kavita Rawat, Mr. Shambhu Sah
A Study-To Combined Cryptography and Steganography Methods: Kavita Rawat, Mr. Shambhu Sah
ABSTRACT
The Formalization of passing data from sender side to receiver side by a fixed way is been changed due to
Information Highway or Internet and Communication Technology. Advancement is so much fast so the concern lies
on security and integrity of data. Digital communication has become an essential part of advancement nowadays.
Maximum services are internet based and it is very important that communication be made secret. Cryptography and
Steganography are the two popular method available to provide security. One hides the existence of the message and
the other distorts the message itself.
Keywords:- Cryptography, Steganography.
III. AES WITH LSB Creyptography and Steganography are well known
methods for providing security. To improve security
STEGANOGRAPHY
we can use combined cryptography and
AES is used to encrypt the data to be transferred then steganography instead of using cryptography or
cipher text is combine into a cover carrier. And 24 bit steganography alone [2]. After an inconclusive
image can be used as cover carrier. The combining comparison, it is difficult to certainly say that
process performed using LSB steganography Steganography can be used as an alternate to
technique [2]. First the plain text is converted using Cryptography. In this paper we are trying to
combined some cryptography methods and
AES cryptography thus we have cipher text. The
cipher text is converted into binary. For each 8 bit steganography methods.
data, the first three bits of the data are replaced by the
REFERENCES
three least significant bits of the red byte, the second
three data bits are replaced by the three least
[1] Hardik kumar,V.desai(B.Sc. MCA),
significant bits of the green byte, the last two data ”Stegnography, Cryptography,
bits are replaced by the two least significant bits of
Watermarking: A Comparative Study”,
the blue byte[2]. Then the image is transmitted to the Journal of Global Research in C.S.-Volume
receiver. 3,no.12, dec2012 ISSN-2229-371X.
[2] A Joseph Rephael.Dr.
V.Sundaram,”Cryptography And
Stegnography- A Survey”, Int
J.Comp.Tech.Appl. Vol 2(3)626-630,
ISSN:2229-6093.
[3] Vishnu S. Babu, Prof. Helen K. J.,”A Study
on Combined Cryptography and
Steganography” I.J.R.S.C.S.E, vol.2
5may2015, ISSN 2349-4840.