Critical Analysis of Cryptography and Steganography
Keywords:
Information Hiding, Cryptography, Steganography, Advanced Encryption Standard (AES), Hex Symbol Steganography.Abstract
Digital communication has become an essential part of infrastructure in the present world and it has witnessed a noticeable and continuous development in a lot of applications during last few decades. Nowadays, almost all applications are Internet-based and it is important that communication be made confidential and secure. Cryptography and steganography are the two important and widely used techniques that are used to provide information security over the open and insecure networks such as Internet. Cryptography distorts the original message itself whereas steganography hides the existence of the message. This paper gives an overview about the concepts of cryptography and steganography. Moreover, it presents a fair comparative analysis between various selected encryption algorithms on various parameters such as key size, block size, speed of encryption, level of security provided by algorithm, and memory usage. It also carries out comparison between traditional steganography methods and Hex Symbol Steganography method on basis of basic parameters such as capacity of carrier file to hide information, robustness and amount of security provided. The comprehensive analysis shows that AES and Hex Symbol Steganography provides more level of security and are robust in nature as compared to other competitors, hence providing more confidentiality.
References
- S. Almuhammadi and A. Al-Shaaby, “A Survey on Recent Approaches Combining Cryptography and Steganographyâ€, Computer Science & Information Technology (CS & IT), 2017.
- S. Mishra, P. Pandey, “A Review on Steganography Techniques Using Cryptographyâ€, International Journal of Advance Research In Science And Engineering, Volume 4, Special Issue (01), 2015.
- M. Pandey and D. Dubey, “Survey Paper: Cryptography The art of hiding Informationâ€, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Volume 2, Issue 12, 2013.
- K. Rahmani, K. Arora and N. Pal, “A Crypto-Steganography: A Surveyâ€, International Journal of Advanced Computer Science and Applications (IJACSA), Volume 5, No. 7, 2014.
- P. Joseph and S. Vishnukumar, “A Study on Steganographic Techniquesâ€, Proceedings of Global Conference on Communication Technologies (GCCT), IEEE, 2015.
- http://io.acad.athabascau.ca/~grizzlie/Comp607/menu.htm
- M. Kumar, V. Kumar and A. Sharma,†A Survey on Various Cryptography Techniquesâ€, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 3, Issue 4, 2014.
- A. Abdullah, “Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Dataâ€, Cryptography and Network Security, 2017.
- G. Yadav and A. Majare,†A Comparative Study of Performance Analysis of Various Encryption Algorithmsâ€, International Conference on Emanations in Modern Technology and Engineering (ICEMTE), Volume: 5 Issue: 3, 2017.
- D. Talukdar and L. Saikia,†A Review On Different Encryption Techniques: A Comparative Studyâ€, International Journal of Engineering Research and General Science, Volume 3, Issue 3, 2015.
- S. Swathi, P. Lahari and B. Thomas,†Encryption Algorithms: A Surveyâ€, International Journal of Advanced Research in Computer Science & Technology (IJARCST), Volume 4, Issue 2, 2016.
- N. Singh, â€Survey Paper on Steganographyâ€, International Refereed Journal of Engineering and Science (IRJES), Volume 6, Issue 1, 2017.
- A. Rashid and M. Rahim, “Critical Analysis of Steganography “An Art of Hidden Writingâ€â€, International Journal of Security and Its Applications, Volume 10, No. 3, 2016.
- S. Asbeh, H. Al-Sewadi, S. Hammoudeh and A. Hammoudeh,  “Hex Symbols Algorithm for Anti-Forensic Artifacts on Android Devicesâ€, International Journal of Advanced Computer Science and Applications (IJACSA), Volume 7, No. 4, 2016.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.