Methodologies in Steganography and Cryptography–Review

  • Chapter
  • First Online:
Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1117))

  • 205 Accesses

Abstract

Today we are living in a digital world. The transfer of data via an unsafe channel is becoming a crucial subject. And simultaneously cybercriminals are growing across the internet and are highly active. Some protective measures must be implemented to safeguard confidential data from theft. Various approaches were applied to encrypt and decrypt confidential or secret information in order to keep the data hidden. The two most renowned techniques from these are cryptography and steganography. However, these two approaches cannot operate as well combined alone. Steganography is a Greek term consisting of Stegano and graphy two words. Stegano stands for secret and graphy signifies writing, i.e., Secret writing indicates steganography. While cryptography turns a secret data into another form that is humanly accessible, this approach has a limiting on the visibility of the secret text/data. Attackers might use hit and trail methods to receive the secret message over the internet. These are two separate approaches that have their own importance. In this article, we will explore the many strategies used to keep the data hidden using cryptography and steganography.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 128.39
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
EUR 171.19
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Kortsarts, Y., & Kempner, Y. (2015) Steganography and cryptography inspired enhancement of introductory programming courses. InformationSystems Education Journal (ISEDJ), ISSN: 1545-679X.

    Google Scholar 

  2. Krishnan, R. B., Thandra, P. K., & Baba, M. S. (2017) An overview of text steganography. In 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN) (pp. 1–6). https://doi.org/10.1109/ICSCN.2017.8085643.

  3. Patil, A. S., & Sundari, G. (2018). An embedding of secret message in audio signal. In 2018 3rd International Conference for Convergence in Technology (I2CT) (pp. 1–3). https://doi.org/10.1109/I2CT.2018.8529549.

  4. Ansari, M. D., Gunjan, V. K., & Rashid, E. (2021). On security and data integrity framework for cloud computing using tamper-proofing. In ICCCE 2020: Proceedings of the 3rd International Conference on Communications and Cyber Physical Engineering (pp. 1419–1427). Springer.

    Google Scholar 

  5. Karimullah, S., Vishnuvardhan, D., & Bhaskar, V. (2022). An improved harmony search approach for block placement for VLSI design automation. Wireless Personnel Communications, 127, 3041–3059. https://doi.org/10.1007/s11277-022-09909-2

    Article  Google Scholar 

  6. Talukdar, J., Singh, T. P., & Barman, B. (2023). Learning evaluation for intelligence. In: Artificial intelligence in healthcare industry. Advanced Technologies and Societal Change. Springer. https://doi.org/10.1007/978-981-99-3157-6_11.

  7. Lakshmanna, K., Shaik, F., Gunjan, V. K., Singh, N., Kumar, G., & Shafi, R. M. (2022). Perimeter degree technique for the reduction of routing congestion during placement in physical design of VLSI circuits. Complexity, 2022, 1–11.

    Article  Google Scholar 

  8. Krishna, S. L. V., Abdul Rahim, B., Shaik, F., & Soundara Rajan, K. (2010). Lossless embedding using pixel differences and histogram shifting technique. In Recent Advances in Space Technology Services and Climate Change 2010 (RSTS & CC-2010), Chennai, India, (pp. 213–216). https://doi.org/10.1109/RSTSCC.2010.5712850.

  9. Karimullah, S., Vishnuvardhan, D., Arif, M., & Gunjan, V. K. (2022). Research article an improved harmony search approach for block placement for VLSI design automation.

    Google Scholar 

  10. Talukdar, J., Singh, T. P., & Barman, B. (2023). Tools and technologies for implementing AI approaches in healthcare. In Artificial intelligence in healthcare industry. Advanced Technologies and Societal Change. Springer. https://doi.org/10.1007/978-981-99-3157-6_10.

  11. Palsodkar, P., Palsodkar, P., Gokhale, A., Dorge, P., & Gurjar, A. (2022). Fuel larceny and leakage indication system using IoT. In Intelligent systems for social good: theory and practice (pp. 81–89). Springer Nature Singapore.

    Google Scholar 

  12. Rudra Kumar, M., Pathak, R., & Gunjan, V. K. (2022). Machine learning-based project resource allocation fitment analysis system (ML-PRAFS). In Computational Intelligence in Machine Learning: Select Proceedings of ICCIML 2021 (pp. 1–14). Springer Nature Singapore.

    Google Scholar 

  13. Singh, A. K., & Singh, J. (2015). Steganography in images using LSB technique. International Journal of Latest Trends in Engineering and Technology (IJLTET), 5(1). ISSN: 2278-621X.

    Google Scholar 

  14. Waghmare, W., Nipanikar, S. I., & Mulmule, P. V. (2018). Holo-entropy and advanced encryption standard for wavelet-based image steganography. International Journal of Research in Engineering, Science and Management, 1(10). www.ijresm.com|ISSN (Online):2581-5782.

  15. Mukherjee, S., Nath, S. S., Singh, G. K., & Banerjee, S. (2022). FACEIFY: Intelligent system for text to image translation. In Intelligent systems for social good: Theory and practice (pp. 51–62). Springer Nature Singapore.

    Google Scholar 

  16. Anusha, M., Bhanu, K. N., & Divyashree, D. (2020). Secured communication of text and audio using image steganography. In 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) (pp. 284–288). https://doi.org/10.1109/ICESC48915.2020.9155715.

  17. Patel, N., & Meena, S. (2016). LSB based image steganography using dynamic key cryptography. In 2016 International Conference on Emerging Trends in Communication Technologies (ETCT), (pp. 1–5). https://doi.org/10.1109/ETCT.2016.7882955.

  18. Saritha, M., Khadabadi, V. M., & Sushravya, M. (2016). Image and text steganography with cryptography using MATLAB. In 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES) (pp. 584–587). https://doi.org/10.1109/SCOPES.2016.7955506.

  19. Hemalatha, S., Acharya, U. D., & Shamathmika. (2017). Mp4 video steganography in wavelet domain. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1229–1235). https://doi.org/10.1109/ICACCI.2017.8126010.

  20. Renuka, B., & Manja Naik, N. (2019). Secure video steganography technique using DWT and H.264. In 2019 1st International Conference on Advances in Information Technology (ICAIT) (pp. 19–23). https://doi.org/10.1109/ICAIT47043.2019.898740.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Krishna Murhty .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Murhty, G.K., Kanimozhi, T. (2024). Methodologies in Steganography and Cryptography–Review. In: Gunjan, V.K., Zurada, J.M., Singh, N. (eds) Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough. Studies in Computational Intelligence, vol 1117. Springer, Cham. https://doi.org/10.1007/978-3-031-43009-1_18

Download citation

Publish with us

Policies and ethics

Navigation