Abstract
Cyber-attack is a category of attack that uses malicious code for intentionally altering the computer data, exploiting computer systems and networks, which might result in disruptive ramification and even compromise the data. Cyber-attack can impel to cybercrimes like information and identity theft. In computing context, the term security means cyber security. The main aim of cyber security is to protect the systems information, communication channels and sending information from unauthorized users. With the increasing volume and sophistication of cyber-attacks, user’s personal information must be protected. This paper presents a review of various data hiding techniques that are used to provide security to the information that is being shared over unsecure channel.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Youngsoo K, Ikkyun K, Namie P (2014) Analysis of cyber attacks and security intelligence. Springer, Berlin
Priyadarshini P, Prashant N, Narayan DG, Meena SMA (2016) Comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. In: International conference on information security & privacy (ICISP), Procedia computer science, vol 78. ScienceDirect, Elsevier, pp 617–624
Rajdeep B, Rahul H (2015) A review and comparative analysis of various encryption algorithms. IJSIA 9(4):289–306
Agrawal CP, Zeenat H (2016) Analysis of different cryptography algorithms. IJSEAS 2(4):347–351
Vandana CK (2013) Modification in advanced encryption standard. JIKRCE 2(2):356–358
Sheetal C, Sandeep S (2014) A Comparative Study of Rivest Cipher Algorithms. IJICT 4(17):1831–1838
Palak RP, Yask P (2014) Survey on different methods of image steganography. IJIRCCE 2(12):7614–7618
Rupali K, Patil AS (2015a) Review paper on different types of steganography. IJRECE 36(2):122–124
Rupali K, Patil AS (2015b) Review paper on different types of steganography. IJRECE 3(2):122–124
Gandharba S (2016) Digital image steganography using variable length group of bits substitution. In: International conference on computational modeling and security (CMS 2016). Procedia Computer Science, vol 85. Elsevier, Amsterdam, pp 31–38
Amandeep K, Rupinder K, Navdeep K (2015) A review on image steganography techniques. IJCA 123(4):20–24
Akanksha S, Monika C, Shilpi S (2018) Comparison of LSB and proposed modified DWT algorithm for image steganography. In: 2018 International conference on advances in computing, communication control and networking (ICACCCN), IEEE
Aya YA, Wafaa RS, Ibrahim MH (2019) Data security in cloud computing using steganography: a review. In: 2019 International conference on innovative trends in computer engineering (ITCE), IEEE
Moni N, Adi S (1994) Visual cryptography. Springer, Berlin
Swati P, Ravindra G (2013) A review of some popular encryption techniques. IJARCSSE 3(2):147–149
Verma OP, Ritu A, Dhiraj D, Shobha T (2011) Performance analysis of data encryption algorithms. IEEE, pp 399–403
Naitik S, Nisarg D, Viral V (2014) Efficient cryptography for data security. In: International conference on computing for sustainable global development. IEEE, pp 908–910
Sourabh C, Smita P, Safikul S A, Goutam S (2014) A comparative survey of symmetric and asymmetric key cryptography. In; International conference on electronics, communication and computational engineering (ICECCE), IEEE, 83–93
Saranya K, Mohanapriya R, Udhayan J (2014) A review on symmetric key encryption techniques in cryptography. IJSETR 3(3):539–544
Gurpreet S, Supriya (2013) A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. IJCA 67(19)
Menon CB, Joy A, Emmanuel E, Paul V (2017) Analysis on symmetric algorithms. In: Int J Eng Sci Comput
Anjula G, Navpreet KW (2014) Cryptography algorithms: a review. IJEDR 2(2):1667–1672
Nitin J, Ajay S, Sandip V (2013) Review and analysis of cryptography techniques. IJSER 4(3):1–6
Puneet K, Shashi BR (2015) Development of modified AES algorithm for data security. Elsevier, Optik
Shivlal M, Pradeep S, Gautam SS (2016) Classification of efficient symmetric key cryptography algorithms. IJCSIS 14(2)
Amritpal S, Harpal S (2015) An improved LSB based image steganography technique for RGB images. IEEE
Sumeet K, Savina B, Bansal RK (2014) Stegaanography and classification of image steganography technique. In: International conference on computing for sustainable global development (INDIACom). IEEE
Navneet K, Sunny B (2014) A survey on various types of steganography and analysis of hiding techniques. IJETT 11(8):388–392
Vijay KS, Vishal S (2012) A steganography algorithm for hiding image in image by improved LSB substitution by minimize detection. JOTAIT 36(1):1–8
Kavitha, Kavita K, Ashwani K, Priya D (2012) Steganography using least significant bit algorithm. IJERA 2(3):338–341
Apurva SM, Sheetal GK (2015) Review on LSB steganography. IJCST 3(2):216–218
Shahzad A, Zakariya SM, Rafiw MQ (2013) Analysis of modified LSB approaches of hiding information in digital images. In: International conference on computational intelligence and communication networks, pp 280–285
Khan M, Jamil A, Seungmin R, Sung WB (2017) Image steganography for authenticity of visual contents in social networks, vol 76(18). Springer, Berlin, pp 18985–19004
Kanojia P, Choudhary V (2019) LSB based Image Steganography with the aid of secret key and enhance its capacity via reducing bit string length. In: 2019 3rd international conference on electronics, communication and aerospace technology (ICECA), IEEE
Carlo B, Alfredo DS, Moni N (2000) Visual cryptography for grey level images. Inf Process Lett 75:255–259
Anjali MB, Premananad KK (2015) Visual cryptography scheme: a review. IJSR 4(3):1309–1311
Ramya J, Parvathavarthini B (2014) An extensive review on visual cryptography schemes. In: International conference on control, instrumentation, communication and computational technologies (ICCICCT). IEEE, pp 223–228
Taghaddos D, Latif A (2014) Visual cryptography for gray-scale images using bit-level. JIHMSP 5(1):90–97
Tamilarasi J, Vanitha V, Renuka T (2014) Improving image quality in extended visual cryptography for halftone images with no pixel expansion. IJSTR 3(4):126–131
Reddy LS, Prasad MVNK (2016) Extended visual cryptography scheme for multi-secret sharing. In: Proceedings of 3rd international conference on advanced computing, networking and informatics. Springer, Berlin
Chinmoy K, Suman K, Sreeparna B (2019) an approach for visual cryptography scheme on color images. Springer, Berlin
Kim HJ, Choi Y (2005) A new visual cryptography using natural images. In: International symposium on circuits and systems. IEEE
Pooja M, Raman C (2015) A review paper on visual cryptography technique. Int J Eng Techn Res (IJETR) 3(7)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bhawna, Kumar, S., Singh, V. (2021). Information Hiding Techniques for Cryptography and Steganography. In: Singh, V., Asari, V.K., Kumar, S., Patel, R.B. (eds) Computational Methods and Data Engineering. Advances in Intelligent Systems and Computing, vol 1257. Springer, Singapore. https://doi.org/10.1007/978-981-15-7907-3_39
Download citation
DOI: https://doi.org/10.1007/978-981-15-7907-3_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7906-6
Online ISBN: 978-981-15-7907-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)