Sunteți pe pagina 1din 18

A REVIEW OF COMBINED EFFECT OF

CRYPTOGRAPHY & STEGANOGRAPHY


TECHNIQUES TO SECURE THE
INFORMATION

Presented by: Ghulam Mustafa, Co Authors: Dr. Rehan Ashraf, Inam Ul Affiliation: Dept. of Computer
Student of MS CS at National Textile Haq, Yusra Khalid, Dr. Muhammad Asif Sciences, National Textile University,
University, Faisalabad, Pakistan Faisalabad, Pakistan
Habib
OUTLINES

 Introduction
 What is Security?
 Cryptography & Steganography
 Analysis of Literature Review
 Conclusion
 Limitations & future work

4/22/2019 2
INTRODUCTION
In the age of technology, the “internet” is the major
component that is used to connect the whole world.
The information or data that we share on the internet is
not secure at all due to hackers and intruders.
The prime attack on the information is a loss of
confidential information or modification of this information
that is called confidentiality and Integrity.

4/22/2019 3
WHAT IS SECURITY?

Freedom from risk, doubt or fear


Something that assures safety
SECURITY

INFORMATION NETWORK
SECURITY SECURITY

4/22/2019 4
SECURITY GOALS

Confidentiality:
information needs to be hidden from unauthorized access
Integrity:
protected from unauthorized change
Authentication:
the communicating entity is the one that it claims to be

4/22/2019 5
CRYPTOGRAPHY & STEGANOGRAPHY
Cryptography is the practice and study of techniques for
secure communication in the presence of third parties
called Intruders or Hackers.

Steganography is the practice of concealing a file,


message, image, audio or video within another file,
message, image, audio or video.

4/22/2019 6
CRYPTOGRAPHY
symmetric key cryptography Asymmetric key cryptography

4/22/2019 7
STEGANOGRAPHY

4/22/2019 8
TYPES OF STEGANOGRAPHY ACCORDING TO
CARRIER:
There are four types of steganography according to the
carrier. These are
text steganography
image steganography
audio/video steganography
protocol steganography

4/22/2019 9
TYPES OF STEGANOGRAPHY WITH RESPECT TO
DOMAIN:
spatial domain
transform/frequency
domain

4/22/2019 10
LITERATURE SURVEY: SUMMARY

4/22/2019 11
ANALYSIS OF LITERATURE REVIEW
Literature review shows that now a days researchers
working the combination of cryptography and
steganography techniques to secure the data over the
internet.
It also shows that if we focus on capacity, then we have to
compromise on security to some extent. If we focus on the
security, then we have to compromise on capacity to some
extent.
4/22/2019 12
CONCLUSION
The combination of cryptography and steganography
enhances their strengths and overcomes each other’s
weaknesses. Which gives more security and make it
difficult for the third person to access or steal the
confidential information.

4/22/2019 13
LIMITATIONS & FUTURE WORK
The limitation of our work is that we deal with image
steganography. There are some other domains of
steganography like text steganography, audio/video
steganography and protocol steganography.
The analysis shows that there is a tradeoff between
security and capacity of the hidden data. So, in future
research, we have to develop a combined cryptography
and steganography technique which overcome the
weaknesses of these algorithms.
4/22/2019 14
REFERENCES
• S. K. Bandyopadhyay and D. Bhattacharyya, A Tutorial Review on Steganography, UFL JIITU, pp. 105114, 2008.
• D. K. Nishad, M. Yadav, K. Kumar, P. Chandra, and R. Rathour, Review Paper on Image Steganography and Security
Using Cryptography, Int. J. Res. Appl. Sci. Eng. Technol., vol. 4, no. X, pp. 215218, 2016.
• A. Baby, P. G. Scholar, and H. Krishnan, Combined Strength of Steganography and Cryptography- A Literature
Survey, Int. J. Adv. Res. Comput. Sci., vol. 8, no. 3, pp. 10071010, 2017.
• G. Mustafa, M. A. Mirza, and A. Jamil, A review of data security and cryptographic techniques in IoT based devices.
In Proceedings of the 2nd International Conference on Future Networks and Distributed Systems (ICFNDS ’18). ACM,
New York, NY, USA, Article 47, 9 pages. DOI: https://doi.org/10.1145/3231053.3231100
• J. Kour, Steganography Techniques A Review Paper, Int. J. Emerg. Res. Manag. & Technology, vol. 9359, no. 5, pp.
132135, 2014.
• S. Kaur, Steganography and Classification of Image Steganography Techniques, in International Conference on
Computing for Sustainable Global Development (INDIACom), 2014, pp. 870875.

4/22/2019 15
REFERENCES
• G. Swain and S. K. Lenka, Classification of Image Steganography Techniques in Spatial Domain: A Study, Int. J. Comput. Sci.
Eng. Technol., vol. 5, no. 3, pp. 219232, 2014.
• I. Engineering, A REVIEW ON STEGANOGRAPHY, Int. J. Adv. Res. Electr. Electron. Instrum. Eng., vol. 2, no. 10, pp. 46354638,
2013.
• M. Jain and P. Kumari, A Survey on Digital Image Steganography using RGB Color Channel, Suresh Gyan Vihar Univ. Int. J.
Environ. Sci. Technol. Vol., vol. 3, no. 1, pp. 2125, 2017.
• S. Goel, A. Rana, and M. Kaur, A Review of Comparison Techniques of Image Steganography, Glob. J. Comput. Sci. Technol.
Graph. Vis., vol. 13, no. 4, p. 7, 2013.
• S. G. Shelke and P. G. Student, Analysis of Spatial Domain Image Steg ganography Techniques, in 2015 International
Conference on Computing
• Communication Control and Automation Analysis, 2015, pp. 665667.
• M. Hussain et al., Image Steganography in Spatial Domain: A Survey, Signal Process. Image Commun., 2018.
• A. Divya and S. Thenmozhi, Steganography: Various Techniques In Spatial and Transform Domain, Int. J. Adv. Sci. Res. Manag.,
vol. 1, no. 3, pp. 8189, 2016.

4/22/2019 16
REFERENCES
• D. Xu, K. Chen, R. Wang, and S. Su, Separable Reversible Data Hiding in Encrypted Images Based on Two-
Dimensional Histogram Modification,
• 2 Secur. Commun. Networks, vol. 2018, p. 14, 2018.
• S. M. M. Islam, A. Hossin, R. K. Shah, and P. K. Bipin, Bit Adjusting Image Steganography in Blue Channel using AES
and Secured Hash Function, Int. J. Comput. Sci. Mob. Comput., vol. 6, no. 11, pp. 2530, 2017.
• T. Johnson and V. Menezes, Improved Steganography using Enhanced K Strange Points Clustering, Int. J. Appl. Eng.
Res., vol. 11, no. 9, pp. 68816885, 2016.
• S. Ushll, G. A. S. Kumal, and K. Boopathybagan, A Secure Triple Level Encryption Method Using Cryptography and
Steganography, in 20 II International Conference on Computer Science and Network Technology, 2011, pp.
10171020.
• D. Xu, K. Chen, R. Wang, and S. Su, Separable Reversible Data Hiding in Encrypted Images Based on Two-
Dimensional Histogram Modification, 2 Secur. Commun. Networks, vol. 2018, p. 14, 2018.
• J. V. C. I. R, Y. Chen, C. Shiu, and G. Horng, Encrypted signal-based reversible data hiding with public key
cryptosystem, J. Vis. Commun. Image Represent, vol. 25, no. 5, pp. 11641170, 2014.

4/22/2019 17
THANK YOU!

Contact:
ghulammustafanfc@gmail.com
4/22/2019 18

S-ar putea să vă placă și