Abstract
Today we are living in a digital world. The transfer of data via an unsafe channel is becoming a crucial subject. And simultaneously cybercriminals are growing across the internet and are highly active. Some protective measures must be implemented to safeguard confidential data from theft. Various approaches were applied to encrypt and decrypt confidential or secret information in order to keep the data hidden. The two most renowned techniques from these are cryptography and steganography. However, these two approaches cannot operate as well combined alone. Steganography is a Greek term consisting of Stegano and graphy two words. Stegano stands for secret and graphy signifies writing, i.e., Secret writing indicates steganography. While cryptography turns a secret data into another form that is humanly accessible, this approach has a limiting on the visibility of the secret text/data. Attackers might use hit and trail methods to receive the secret message over the internet. These are two separate approaches that have their own importance. In this article, we will explore the many strategies used to keep the data hidden using cryptography and steganography.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kortsarts, Y., & Kempner, Y. (2015) Steganography and cryptography inspired enhancement of introductory programming courses. InformationSystems Education Journal (ISEDJ), ISSN: 1545-679X.
Krishnan, R. B., Thandra, P. K., & Baba, M. S. (2017) An overview of text steganography. In 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN) (pp. 1–6). https://doi.org/10.1109/ICSCN.2017.8085643.
Patil, A. S., & Sundari, G. (2018). An embedding of secret message in audio signal. In 2018 3rd International Conference for Convergence in Technology (I2CT) (pp. 1–3). https://doi.org/10.1109/I2CT.2018.8529549.
Ansari, M. D., Gunjan, V. K., & Rashid, E. (2021). On security and data integrity framework for cloud computing using tamper-proofing. In ICCCE 2020: Proceedings of the 3rd International Conference on Communications and Cyber Physical Engineering (pp. 1419–1427). Springer.
Karimullah, S., Vishnuvardhan, D., & Bhaskar, V. (2022). An improved harmony search approach for block placement for VLSI design automation. Wireless Personnel Communications, 127, 3041–3059. https://doi.org/10.1007/s11277-022-09909-2
Talukdar, J., Singh, T. P., & Barman, B. (2023). Learning evaluation for intelligence. In: Artificial intelligence in healthcare industry. Advanced Technologies and Societal Change. Springer. https://doi.org/10.1007/978-981-99-3157-6_11.
Lakshmanna, K., Shaik, F., Gunjan, V. K., Singh, N., Kumar, G., & Shafi, R. M. (2022). Perimeter degree technique for the reduction of routing congestion during placement in physical design of VLSI circuits. Complexity, 2022, 1–11.
Krishna, S. L. V., Abdul Rahim, B., Shaik, F., & Soundara Rajan, K. (2010). Lossless embedding using pixel differences and histogram shifting technique. In Recent Advances in Space Technology Services and Climate Change 2010 (RSTS & CC-2010), Chennai, India, (pp. 213–216). https://doi.org/10.1109/RSTSCC.2010.5712850.
Karimullah, S., Vishnuvardhan, D., Arif, M., & Gunjan, V. K. (2022). Research article an improved harmony search approach for block placement for VLSI design automation.
Talukdar, J., Singh, T. P., & Barman, B. (2023). Tools and technologies for implementing AI approaches in healthcare. In Artificial intelligence in healthcare industry. Advanced Technologies and Societal Change. Springer. https://doi.org/10.1007/978-981-99-3157-6_10.
Palsodkar, P., Palsodkar, P., Gokhale, A., Dorge, P., & Gurjar, A. (2022). Fuel larceny and leakage indication system using IoT. In Intelligent systems for social good: theory and practice (pp. 81–89). Springer Nature Singapore.
Rudra Kumar, M., Pathak, R., & Gunjan, V. K. (2022). Machine learning-based project resource allocation fitment analysis system (ML-PRAFS). In Computational Intelligence in Machine Learning: Select Proceedings of ICCIML 2021 (pp. 1–14). Springer Nature Singapore.
Singh, A. K., & Singh, J. (2015). Steganography in images using LSB technique. International Journal of Latest Trends in Engineering and Technology (IJLTET), 5(1). ISSN: 2278-621X.
Waghmare, W., Nipanikar, S. I., & Mulmule, P. V. (2018). Holo-entropy and advanced encryption standard for wavelet-based image steganography. International Journal of Research in Engineering, Science and Management, 1(10). www.ijresm.com|ISSN (Online):2581-5782.
Mukherjee, S., Nath, S. S., Singh, G. K., & Banerjee, S. (2022). FACEIFY: Intelligent system for text to image translation. In Intelligent systems for social good: Theory and practice (pp. 51–62). Springer Nature Singapore.
Anusha, M., Bhanu, K. N., & Divyashree, D. (2020). Secured communication of text and audio using image steganography. In 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) (pp. 284–288). https://doi.org/10.1109/ICESC48915.2020.9155715.
Patel, N., & Meena, S. (2016). LSB based image steganography using dynamic key cryptography. In 2016 International Conference on Emerging Trends in Communication Technologies (ETCT), (pp. 1–5). https://doi.org/10.1109/ETCT.2016.7882955.
Saritha, M., Khadabadi, V. M., & Sushravya, M. (2016). Image and text steganography with cryptography using MATLAB. In 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES) (pp. 584–587). https://doi.org/10.1109/SCOPES.2016.7955506.
Hemalatha, S., Acharya, U. D., & Shamathmika. (2017). Mp4 video steganography in wavelet domain. In 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 1229–1235). https://doi.org/10.1109/ICACCI.2017.8126010.
Renuka, B., & Manja Naik, N. (2019). Secure video steganography technique using DWT and H.264. In 2019 1st International Conference on Advances in Information Technology (ICAIT) (pp. 19–23). https://doi.org/10.1109/ICAIT47043.2019.898740.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Murhty, G.K., Kanimozhi, T. (2024). Methodologies in Steganography and Cryptography–Review. In: Gunjan, V.K., Zurada, J.M., Singh, N. (eds) Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough. Studies in Computational Intelligence, vol 1117. Springer, Cham. https://doi.org/10.1007/978-3-031-43009-1_18
Download citation
DOI: https://doi.org/10.1007/978-3-031-43009-1_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-43008-4
Online ISBN: 978-3-031-43009-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)