Critical Analysis of Cryptography and Steganography

Authors

  • Alpa Agath  I.T. Department, V.V.P. Engineering College, Rajkot, Gujarat, India
  • Chintan Sidpara  I.T. Department, V.V.P. Engineering College, Rajkot, Gujarat, India
  • Darshan Upadhyay  I.T. Department, V.V.P. Engineering College, Rajkot, Gujarat, India

Keywords:

Information Hiding, Cryptography, Steganography, Advanced Encryption Standard (AES), Hex Symbol Steganography.

Abstract

Digital communication has become an essential part of infrastructure in the present world and it has witnessed a noticeable and continuous development in a lot of applications during last few decades. Nowadays, almost all applications are Internet-based and it is important that communication be made confidential and secure. Cryptography and steganography are the two important and widely used techniques that are used to provide information security over the open and insecure networks such as Internet. Cryptography distorts the original message itself whereas steganography hides the existence of the message. This paper gives an overview about the concepts of cryptography and steganography. Moreover, it presents a fair comparative analysis between various selected encryption algorithms on various parameters such as key size, block size, speed of encryption, level of security provided by algorithm, and memory usage. It also carries out comparison between traditional steganography methods and Hex Symbol Steganography method on basis of basic parameters such as capacity of carrier file to hide information, robustness and amount of security provided. The comprehensive analysis shows that AES and Hex Symbol Steganography provides more level of security and are robust in nature as compared to other competitors, hence providing more confidentiality.

References

  1. S. Almuhammadi and A. Al-Shaaby, “A Survey on Recent Approaches Combining Cryptography and Steganography”, Computer Science & Information Technology (CS & IT), 2017.
  2. S. Mishra, P. Pandey, “A Review on Steganography Techniques Using Cryptography”, International Journal of Advance Research In Science And Engineering, Volume 4, Special Issue (01), 2015.
  3. M. Pandey and D. Dubey, “Survey Paper: Cryptography The art of hiding Information”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 2, Issue 12, 2013.
  4. K. Rahmani, K. Arora and N. Pal, “A Crypto-Steganography: A Survey”, International Journal of Advanced Computer Science and Applications (IJACSA), Volume 5, No. 7, 2014.
  5. P. Joseph and S. Vishnukumar, “A Study on Steganographic Techniques”, Proceedings of Global Conference on Communication Technologies (GCCT), IEEE, 2015.
  6. http://io.acad.athabascau.ca/~grizzlie/Comp607/menu.htm
  7. M. Kumar, V. Kumar and A. Sharma,” A Survey on Various Cryptography Techniques”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 3, Issue 4, 2014.
  8. A. Abdullah, “Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data”, Cryptography and Network Security, 2017.
  9. G. Yadav and A. Majare,” A Comparative Study of Performance Analysis of Various Encryption Algorithms”, International Conference on Emanations in Modern Technology and Engineering (ICEMTE), Volume: 5 Issue: 3, 2017.
  10. D. Talukdar and L. Saikia,” A Review On Different Encryption Techniques: A Comparative Study”, International Journal of Engineering Research and General Science, Volume 3, Issue 3, 2015.
  11. S. Swathi, P. Lahari and B. Thomas,” Encryption Algorithms: A Survey”, International Journal of Advanced Research in Computer Science & Technology (IJARCST), Volume 4, Issue 2, 2016.
  12. N. Singh, ”Survey Paper on Steganography”, International Refereed Journal of Engineering and Science (IRJES), Volume 6, Issue 1, 2017.
  13. A. Rashid and M. Rahim, “Critical Analysis of Steganography “An Art of Hidden Writing””, International Journal of Security and Its Applications, Volume 10, No. 3, 2016.
  14. S. Asbeh, H. Al-Sewadi, S. Hammoudeh and A. Hammoudeh,   “Hex Symbols Algorithm for Anti-Forensic Artifacts on Android Devices”, International Journal of Advanced Computer Science and Applications (IJACSA), Volume 7, No. 4, 2016.

Downloads

Published

2018-01-20

Issue

Section

Research Articles

How to Cite

[1]
Alpa Agath, Chintan Sidpara, Darshan Upadhyay, " Critical Analysis of Cryptography and Steganography, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 2, pp.01-06, January-February-2018.