Information Hiding Techniques for Cryptography and Steganography

  • Conference paper
  • First Online:
Computational Methods and Data Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1257))

Abstract

Cyber-attack is a category of attack that uses malicious code for intentionally altering the computer data, exploiting computer systems and networks, which might result in disruptive ramification and even compromise the data. Cyber-attack can impel to cybercrimes like information and identity theft. In computing context, the term security means cyber security. The main aim of cyber security is to protect the systems information, communication channels and sending information from unauthorized users. With the increasing volume and sophistication of cyber-attacks, user’s personal information must be protected. This paper presents a review of various data hiding techniques that are used to provide security to the information that is being shared over unsecure channel.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now
Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 160.49
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 213.99
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Youngsoo K, Ikkyun K, Namie P (2014) Analysis of cyber attacks and security intelligence. Springer, Berlin

    Google Scholar 

  2. Priyadarshini P, Prashant N, Narayan DG, Meena SMA (2016) Comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. In: International conference on information security & privacy (ICISP), Procedia computer science, vol 78. ScienceDirect, Elsevier, pp 617–624

    Google Scholar 

  3. Rajdeep B, Rahul H (2015) A review and comparative analysis of various encryption algorithms. IJSIA 9(4):289–306

    Article  Google Scholar 

  4. Agrawal CP, Zeenat H (2016) Analysis of different cryptography algorithms. IJSEAS 2(4):347–351

    Google Scholar 

  5. Vandana CK (2013) Modification in advanced encryption standard. JIKRCE 2(2):356–358

    Google Scholar 

  6. Sheetal C, Sandeep S (2014) A Comparative Study of Rivest Cipher Algorithms. IJICT 4(17):1831–1838

    Google Scholar 

  7. Palak RP, Yask P (2014) Survey on different methods of image steganography. IJIRCCE 2(12):7614–7618

    Google Scholar 

  8. Rupali K, Patil AS (2015a) Review paper on different types of steganography. IJRECE 36(2):122–124

    Google Scholar 

  9. Rupali K, Patil AS (2015b) Review paper on different types of steganography. IJRECE 3(2):122–124

    Google Scholar 

  10. Gandharba S (2016) Digital image steganography using variable length group of bits substitution. In: International conference on computational modeling and security (CMS 2016). Procedia Computer Science, vol 85. Elsevier, Amsterdam, pp 31–38

    Google Scholar 

  11. Amandeep K, Rupinder K, Navdeep K (2015) A review on image steganography techniques. IJCA 123(4):20–24

    Article  Google Scholar 

  12. Akanksha S, Monika C, Shilpi S (2018) Comparison of LSB and proposed modified DWT algorithm for image steganography. In: 2018 International conference on advances in computing, communication control and networking (ICACCCN), IEEE

    Google Scholar 

  13. Aya YA, Wafaa RS, Ibrahim MH (2019) Data security in cloud computing using steganography: a review. In: 2019 International conference on innovative trends in computer engineering (ITCE), IEEE

    Google Scholar 

  14. Moni N, Adi S (1994) Visual cryptography. Springer, Berlin

    Google Scholar 

  15. Swati P, Ravindra G (2013) A review of some popular encryption techniques. IJARCSSE 3(2):147–149

    Google Scholar 

  16. Verma OP, Ritu A, Dhiraj D, Shobha T (2011) Performance analysis of data encryption algorithms. IEEE, pp 399–403

    Google Scholar 

  17. Naitik S, Nisarg D, Viral V (2014) Efficient cryptography for data security. In: International conference on computing for sustainable global development. IEEE, pp 908–910

    Google Scholar 

  18. Sourabh C, Smita P, Safikul S A, Goutam S (2014) A comparative survey of symmetric and asymmetric key cryptography. In; International conference on electronics, communication and computational engineering (ICECCE), IEEE, 83–93

    Google Scholar 

  19. Saranya K, Mohanapriya R, Udhayan J (2014) A review on symmetric key encryption techniques in cryptography. IJSETR 3(3):539–544

    Google Scholar 

  20. Gurpreet S, Supriya (2013) A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. IJCA 67(19)

    Google Scholar 

  21. Menon CB, Joy A, Emmanuel E, Paul V (2017) Analysis on symmetric algorithms. In: Int J Eng Sci Comput

    Google Scholar 

  22. Anjula G, Navpreet KW (2014) Cryptography algorithms: a review. IJEDR 2(2):1667–1672

    Google Scholar 

  23. Nitin J, Ajay S, Sandip V (2013) Review and analysis of cryptography techniques. IJSER 4(3):1–6

    Google Scholar 

  24. Puneet K, Shashi BR (2015) Development of modified AES algorithm for data security. Elsevier, Optik

    Google Scholar 

  25. Shivlal M, Pradeep S, Gautam SS (2016) Classification of efficient symmetric key cryptography algorithms. IJCSIS 14(2)

    Google Scholar 

  26. Amritpal S, Harpal S (2015) An improved LSB based image steganography technique for RGB images. IEEE

    Google Scholar 

  27. Sumeet K, Savina B, Bansal RK (2014) Stegaanography and classification of image steganography technique. In: International conference on computing for sustainable global development (INDIACom). IEEE

    Google Scholar 

  28. Navneet K, Sunny B (2014) A survey on various types of steganography and analysis of hiding techniques. IJETT 11(8):388–392

    Article  Google Scholar 

  29. Vijay KS, Vishal S (2012) A steganography algorithm for hiding image in image by improved LSB substitution by minimize detection. JOTAIT 36(1):1–8

    Google Scholar 

  30. Kavitha, Kavita K, Ashwani K, Priya D (2012) Steganography using least significant bit algorithm. IJERA 2(3):338–341

    Google Scholar 

  31. Apurva SM, Sheetal GK (2015) Review on LSB steganography. IJCST 3(2):216–218

    Google Scholar 

  32. Shahzad A, Zakariya SM, Rafiw MQ (2013) Analysis of modified LSB approaches of hiding information in digital images. In: International conference on computational intelligence and communication networks, pp 280–285

    Google Scholar 

  33. Khan M, Jamil A, Seungmin R, Sung WB (2017) Image steganography for authenticity of visual contents in social networks, vol 76(18). Springer, Berlin, pp 18985–19004

    Google Scholar 

  34. Kanojia P, Choudhary V (2019) LSB based Image Steganography with the aid of secret key and enhance its capacity via reducing bit string length. In: 2019 3rd international conference on electronics, communication and aerospace technology (ICECA), IEEE

    Google Scholar 

  35. Carlo B, Alfredo DS, Moni N (2000) Visual cryptography for grey level images. Inf Process Lett 75:255–259

    Article  Google Scholar 

  36. Anjali MB, Premananad KK (2015) Visual cryptography scheme: a review. IJSR 4(3):1309–1311

    Google Scholar 

  37. Ramya J, Parvathavarthini B (2014) An extensive review on visual cryptography schemes. In: International conference on control, instrumentation, communication and computational technologies (ICCICCT). IEEE, pp 223–228

    Google Scholar 

  38. Taghaddos D, Latif A (2014) Visual cryptography for gray-scale images using bit-level. JIHMSP 5(1):90–97

    Google Scholar 

  39. Tamilarasi J, Vanitha V, Renuka T (2014) Improving image quality in extended visual cryptography for halftone images with no pixel expansion. IJSTR 3(4):126–131

    Google Scholar 

  40. Reddy LS, Prasad MVNK (2016) Extended visual cryptography scheme for multi-secret sharing. In: Proceedings of 3rd international conference on advanced computing, networking and informatics. Springer, Berlin

    Google Scholar 

  41. Chinmoy K, Suman K, Sreeparna B (2019) an approach for visual cryptography scheme on color images. Springer, Berlin

    Google Scholar 

  42. Kim HJ, Choi Y (2005) A new visual cryptography using natural images. In: International symposium on circuits and systems. IEEE

    Google Scholar 

  43. Pooja M, Raman C (2015) A review paper on visual cryptography technique. Int J Eng Techn Res (IJETR) 3(7)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bhawna .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bhawna, Kumar, S., Singh, V. (2021). Information Hiding Techniques for Cryptography and Steganography. In: Singh, V., Asari, V.K., Kumar, S., Patel, R.B. (eds) Computational Methods and Data Engineering. Advances in Intelligent Systems and Computing, vol 1257. Springer, Singapore. https://doi.org/10.1007/978-981-15-7907-3_39

Download citation

Publish with us

Policies and ethics

Navigation