SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
ISSN:2229-6093
                              A.Joseph Raphael,Dr.V Sundaram, Int. J. Comp. Tech. Appl., Vol 2 (3), 626-630




                        Cryptography and Steganography – A Survey

                   A. Joseph Raphael                                        Dr. V. Sundaram, Head & Director
                     Research Scholar                                       Department of Computer Applications
                    Karpagam University                                     Karpagam College of Engineering
                    Coimbatore, India.                                      Coimbatore, India.




   Abstract— Digital communication has become an essential             private key that only the recipient of messages uses. In
part of infrastructure nowadays, a lot of applications are             Cryptography, a cipher message for instance, might
Internet-based and it is important that communication be               arouse suspicion on the part of the recipient while an
made secret. As a result, the security of information passed           invisible message created with steganographic methods
over an open channel has become a fundamental issue and
therefore, the confidentiality and data integrity are required to
                                                                       will not. In fact, steganography can be useful when the
protect against unauthorized access and use. This has                  use of cryptography is forbidden: where cryptography
resulted in an unstable growth in the field of information             and strong encryption are outlawed, steganography can
hiding. Cryptography and steganography are the two popular             circumvent such policies to pass message covertly.
methods available to provide security. One hides the                   However, steganography and cryptography differ in the
existence of the message and the other distorts the message            way they are evaluated: steganography fails when the
itself. Using cryptography, the data is transformed into some          ”enemy” is able to access the content of the cipher
other gibberish form and then the encrypted data is
                                                                       message, while cryptography fails when the ”enemy”
transmitted. In steganography, the data is embedded in an
image file and the image file is transmitted. This paper               detects that there is a secret message present in the
focuses on the strength of combining cryptography and                  steganographic medium.
stegnography methods to enhance the security of
communication over an open channel.                                    The disciplines that study techniques for deciphering
                                                                       cipher messages and detecting hide messages are called
                                                                       cryptanalysis and steganalysis. The former denotes the
  Index Terms—Stegano object, cryptanalysis, cipher text               set of methods for obtaining the meaning of encrypted
                                                                       information, while the latter is the art of discovering
                                                                       covert messages. The aim of this paper is to describe a
                    I INTRODUCTION                                     method for integrating together cryptography and
                                                                       steganography through some media such as image,
  Cryptography and Steganography are well known and                    audio, video, etc.
widely used techniques that manipulate information in
order to cipher or hide their existence respectively.                                            II HISTORY
Steganography is the art and science of communicating
in a way which hides the existence of the                                 Cryptography has followed man through many stages
communication. Cryptography scrambles a message so it                  of evolution [3]. Cryptography can be found as far back
cannot be understood; the Steganography hides the                      as 1900 B.C. in ancient Egyptian scribe using non-
message so it cannot be seen. Even though both methods                 standard hieroglyphics in an inscription. From 500 – 600
provide security, a study is made to combine both                      B.C. Hebrew scribes used ATBASH, a reversed alphabet
cryptography and Steganography methods into one                        simple solution cipher. From 50 - 60 B.C. Julius Caesar
system for better confidentiality and security.                        used a simple substitution with the normal alphabet in
                                                                       government communications. Cryptography continued
  Cryptography systems can be broadly classified into                  through history with may variations. Today cryptography
symmetric-key systems that use a single key that both the              has reached a new level, quantum cryptography.
sender and the receiver have, and public-key systems that              Quantum cryptography combines physics and
use two keys, a public key known to everyone and a                     cryptography to produce a new cryptosystem that cannot



                                                                                                                     626
ISSN:2229-6093
                           A.Joseph Raphael,Dr.V Sundaram, Int. J. Comp. Tech. Appl., Vol 2 (3), 626-630


be defeated without the sender and receiver having the             Cryptanalysis [2] is the reverse engineering of
knowledge of the attempted and failed intrusion.                   cryptography—attempts to identify weaknesses of
Through the long history of cryptography, steganography            various    cryptographic       algorithms and their
was developed and flourished on its own.                           implementations to exploit them. Any attempt at
                                                                   cryptanalysis is defined as an attack.
Steganography comes from the Greek steganos (covered
or secret) and -graphy (writing or drawing).                       Cryptology encompasses both cryptography and
Steganography can be defined as the hiding of                      cryptanalysis and looks at mathematical problems that
information by embedding messages within other,                    underlie them.
seemingly harmless messages, graphics or sounds. The
first steganographic technique was developed in ancient            Cryptosystems are computer systems used to encrypt
Greece around 440 B.C. The Greek ruler Histaeus                    data for secure transmission and storage.
employed an early version of steganography which
involved: shaving the head of a slave, tattooing the               Plaintext is message or data which are in their normal,
message on the slaves scalp, waiting for the growth of             readable (not crypted) form.
hair to disclose the secret message, and sending the slave
on his way to deliver the message. The recipient would             Encryption: Encoding the contents of the message in
have the slave’s head to uncover the message. The                  such a way that hides its contents from outsiders.
recipient would reply in the same form of steganography.
In the same time period, another early form of                     Cipher text results from plaintext by applying the
steganography was employed. This method involved
                                                                   encryption key.
Demerstus, who wrote a message to the Spartans warning
of eminent invasions from Xerxes. The message was
                                                                   Decryption: The process of retrieving the plaintext back
carved on the wood of wax tablet, and then covered with
a fresh layer of wax. This seemingly blank tablet was              from the cipher text.
delivered with its hidden message successfully.
Steganography continued development in the early 1600s             Key: Encryption and decryption usually make use of a
as Sir Francis Bacon used a variation in type face to carry        key, and the coding method is such that decryption can
each bit of the encoding.                                          be performed only by knowing the proper key.
The microdots were complete documents, pictures, and
plans reduced in size to the size of a period and attached         Steganography is the method of hiding secret messages
to common paperwork. Null ciphers were also used to                in an ordinary document.
pass secret messages. Null ciphers are unencrypted
messages with real messages embedded in the current                Steganalysis could be simply defined as the detection of
text. Hidden messages were hard to interpret within the            steganography by a third party.
innocent messages. An example of an innocent message
containing a null cipher is:                                       Hash functions generate a digest of the message.

Fishing freshwater bends and saltwater coasts rewards              Substitution cipher involves replacing an alphabet with
anyone feeling stressed. Resourceful anglers usually find          another character of the same alphabet set.
masterful leapers fun and admit swordfish rank
overwhelming any day.                                              Mono-alphabetic system uses a single alphabetic set for
                                                                   substitutions.
By taking the third letter in each word the following
message emerges:
                                                                   Poly-alphabetic system uses multiple alphabetic sets for
 Send Lawyers, Guns, and Money.
                                                                   substitutions.
         III DEFINITION & TERMINOLOGY
                                                                   Caesar cipher is a mono-alphabetic system in which each
Cryptography defines the art and science of transforming           character is replaced by the third character in succession.
data into a sequence of bits that appears as random and            Julius Caesar used this method of encryption.
meaningless to a side observer or attacker.



                                                                                                                      627
ISSN:2229-6093
                           A.Joseph Raphael,Dr.V Sundaram, Int. J. Comp. Tech. Appl., Vol 2 (3), 626-630


A digital signature is a block of data that is generated by        a two-key crypto system in which two parties could
the sender of a message using his/her secret key.                  engage in a secure communication over a insecure
                                                                   communications channel without having to share a secret
                 IV CRYPTOGRAPHY                                   key.

   Cryptography is an important element of any strategy            Digital Signature: The use of digital signature came from
to address message transmission security requirements.             the need of ensuring the authentication. The digital
Cryptography is the study of methods of sending                    signature is more like stamp or signature of the sender
messages in disguised form so that only the intended               which is embedded together with the data and encrypts it
recipients can remove the disguise and read the message.           with the private key in order to send it to the other party.
                                                                   In addition, the signature assures that any change made to
It is the practical art of converting messages or data into
                                                                   the data that has been signed is easy to detect by the
a different form, such that no-one can read them without
                                                                   receiver.
having access to the 'key'. The message may be
converted using a 'code' (in which case each character or
                                                                   Hash Function: The hash function is a one way
group of characters is substituted by an alternative one),
                                                                   encryption, the hash function is a well defined procedure
or a 'cypher' or 'cipher' (in which case the message as a
                                                                   or mathematical formula that represents a small size of
whole      is    converted,     rather   than   individual
                                                                   bits which is generated from a large sized file, the result
characters).Cryptology is the science underlying
                                                                   of this function can be called hash code or hashes. The
cryptography. Cryptanalysis is the science of 'breaking'
                                                                   generating of hash code is faster than other methods
or 'cracking' encryption schemes, i.e. discovering the
                                                                   which make it more desired for authentication and
decryption key. Cryptographic systems are generically
                                                                   integrity. Cryptographic hash functions are much used
classified along three independent dimensions [1].
                                                                   for digital signature and cheap constructions are highly
                                                                   desirable. The use of cryptographic hash functions for
1. Methodology for transforming plain text to cipher text.
                                                                   message authentication has become a standard approach
All encryption algorithms are based on two general                 in many applications, particularly internet security
principles: substitution, in which each element in the             protocols.      The authentication and the integrity
plaintext is mapped into another element, and                      considered as main issues in information security, the
transposition, in which elements in the plaintext are              hash code can be attached to the original file then at any
rearranged. The fundamental requirement is that no                 time the users are able to check the authentication and
information be lost.                                               integrity after sending the secure data by applying the
                                                                   hash function to the message again and compare the
2. Methodology for number of keys used.                            result to the sender hash code, if it’s similar that is mean
                                                                   the message came from the original sender without
There are some standards methods[4] which is used with             altering because if there is any changed has been made to
cryptography such as secret key, public key, digital               the data will changed the hash code at the receiver side.
signature and hash function.
                                                                   3. Methodology for processing plain text.
Secret Key (Symmetric): With secret key cryptography, a
single key is used for both encryption and decryption.             A block cipher processes the input one block of elements
The sender uses the key to encrypt the plaintext and               at a time, producing an output block for each input
sends the cipher text to the receiver. The receiver applies        block. A stream cipher processes the input elements
the same key to decrypt the message and recover the                continuously, producing output one element at a time, as
plaintext. Because a single key is used for both                   it goes along. The proposed algorithm uses a substitution
functions, secret key cryptography is also called as               cipher method. It is a symmetric key algorithm using the
symmetric encryption.                                              technique of stream cipher.

Public Key : Public key cryptography has been said to be
the most significant new development in cryptography in
the last 300-400 years.          Modern Public Key
Cryptography was first described publicly by Standford
University professor Martin Hellman and graduate
student Whitfield Diffie in 1976. Their study described

                                                                                                                     628
ISSN:2229-6093
                          A.Joseph Raphael,Dr.V Sundaram, Int. J. Comp. Tech. Appl., Vol 2 (3), 626-630


                 V STEGANOGRAPHY                                  According to dictionary.com: Steganography is:” Hiding
                                                                  a secret message within a larger one in such a way that
The word steganography comes from the Greek                       others can not discern the presence or contents of the
Steganos, which mean covered or secret and graphy                 hidden message” and Cryptography is “The process or
means writing or drawing. Therefore, steganography                skill of communicating in, or deciphering secret writing
means, literally, covered writing. The main goal or               or ciphers.” Steganography can be used to cloak hidden
steganography is to communicate securely in a                     messages in image, audio and even text files. It has until
completely undetectable manner and to avoid drawing               recently been the poor cousin of cryptography. Now, it is
suspicion to the transmission of a hidden data [4].               gaining new popularity with the current industry
During the process, characteristics of these methods are          demands for digital watermarking and fingerprinting of
to change in the structure and features so as not to be           audio and video. Steganography must not be confused
identifiable by human eye. Digital images, videos, sound          with cryptography, where we transform the message so
files, and other computer files that contain perceptually         as to make its meaning obscure to malicious people who
irrelevant or redundant information can be used as
                                                                  intercept it. Therefore, the definition of breaking the
“covers” or carriers to hide secret messages. After
                                                                  system is different. In cryptography, the system is broken
embedding a secret message into the cover-image, a so-
                                                                  when the attacker can read the secret message. Breaking
called stegoimage is obtained. The basic model of
                                                                  a steganographic system needs the attacker to detect that
steganography consists of Carrier, Message, Embedding
algorithm and Stego key. The model for steganography is           steganography has been used and he is able to read the
shown in Figure 1. Carrier is also known as a cover-              embedded message. In addition, the security of classical
object, which embeds the message and serves to hide its           steganography system relies on secrecy of the data
presence.                                                         encoding system. Once the encoding system is known,
                                                                  the steganography system is defeated. The distinction
                                                                  between cryptography and steganography is an important
                                                                  one, and is summarized by the following table.




           Fig. 1. A model of Steganography

Capacity, security and robustness are three different
aspects affecting steganography and its usefulness.
Capacity refers to the amount of information that can be
hidden in the cover medium. Security relates to an
eavesdropper’s inability to detect hidden information
and robustness is the amount of modification the stego
medium can withstand before an adversary can destroy
the hidden information.

      VI STEGANOGRAPHY VS CRYPTOGRAPHY

   Basically, the purpose of cryptography and
steganography is to provide secret communication.


                                                                                                                   629
ISSN:2229-6093
                           A.Joseph Raphael,Dr.V Sundaram, Int. J. Comp. Tech. Appl., Vol 2 (3), 626-630


     VII COMBINED CRYPTO-STEGANOGRAPHY                             The idea of this type is to encrypt the secret message or
                                                                   data by secret key approach and to hide the encrypted
Steganography is not the same as cryptography Data                 data within cover carrier.
hiding techniques have been widely used to transmission
of hiding secret message for long time. Ensuring data              Public Key Steganography:              The last type of
security is a big challenge for computer users. Business           steganography is to combine the public key cryptography
men, professionals, and home users all have some                   approach and the steganography approach. The idea of
important data that they want to secure from others.               this type is to encrypt the secret data using the public key
Even though both methods provide security, to add                  approach and then hide the encrypted data within cover
multiple layers of security it is always a good practice to        carrier.
use Cryptography and Steganography together. By
                                                                                              REFERENCES
combining, the data encryption can be done by a
software and then embed the cipher text in an image or
any other media with the help of stego key. The                    [1] Neha Sharma, J.S. Bhatia and Dr. Neena Gupta, “ An
combination of these two methods will enhance the                     Encrypto-Stego Technique Based secure data Transmission
                                                                      System”, PEC, Chandigarh.
security of the data embedded. This combined chemistry
will satisfy the requirements such as capacity, security           [2] I. Venkata Sai Manoj, “Cryptography and Steganography”,
and robustness for secure data transmission over an open               International Journal of Computer Applications (0975 –
channel.                                                               8887), Volume 1 – No.12
                                                                   [3] Alan Siper, Roger Farley and Craig Lombardo, “The Rise
                                                                       of Steganography”, Proceedings of Student/Faculty
A pictorial representation of the combined concept of
                                                                       Research Day, CSIS, Pace University, May 6th, 2005.
cryptography and steganography is depicted in figure 2.            [4] B B Zaidan, A.A Zaidan, A.K. Al-Frajat and H.A. Jalab,
                                                                       “On the Differences between Hiding Information and
                                                                       Cryptography Techniques: An Overview”, Journal of
                                                                       Applied Sciences 10(15): 1650-1655, 2010
                                                                   [5] Domenico Bloisi and Luca Iocchi, “Image Based
                                                                       Steganography and Cryptography”, Sapienza University of
                                                                       Rome, Italy.
                                                                   [6] Kallam Ravindra Babu, Dr. S.Udaya Kumar, Dr. A.Vinaya
                                                                       Babu, “A Survey on Cryptography and Steganography
                                                                       Methods for Information Security”, Internaltional Journal
                                                                       of Computer Applications(0975-8887), Volume 12 – No. 2,
                                                                       November 2010.
                                                                   [7] Dipti Kapoor Sarmah, Neha bajpai, “ Proposed System for
In figure 2, both the methods are combined by                          Data Hhiding Using Cryptography and Steganography”,
encrypting message using cryptography and then hiding                  International Journal of Computer Applications (0975 –
the encrypted message using steganography.         The                 8887), Volume 8 – No. 9, October 2010.
resulting stego-image can be transmitted without                   [8] Eiji Kawaguchi and Richard O. Eason, “Principle
revealing that secret information is being exchanged.                 and applications of BPCS-Steganography”, Kyushu
Furthermore, even if an attacker were to defeat the                   Institute of Technology, Kitakyushu, Japan,
steganographic technique to detect the message from the               University of Maine, Orono, Maine 04469-5708.
stego-object, he would still require the cryptographic             [9]Sashikala Channalli and Ajay Jadhav, “Steganography
decoding key to decipher the encrypted message. Since                 An Art of Hiding Data”, International Journal on
then, the steganography approaches can be divided into                Computer Science and Engineering Vol.1(3), 2009,
three types [4]:                                                      137-141.

Pure Steganography: This technique simply uses the
steganography approach only without combining other
methods. It is working on hiding information within
cover carrier.

Secret Key steganography:           The secret key
steganography use the combination of the secret key
cryptography technique and the steganography approach.

                                                                                                                      630

Mais conteúdo relacionado

Mais procurados

Summer report crypto
Summer report cryptoSummer report crypto
Summer report cryptoGaurav Shukla
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"Aditya Raina
 
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelA Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelMohit Goel
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full reportharpoo123143
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelMohit Goel
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first reviewThomas George C
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444IJRAT
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography PresentationDonte Francis
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 

Mais procurados (20)

Cryptography
CryptographyCryptography
Cryptography
 
Summer report crypto
Summer report cryptoSummer report crypto
Summer report crypto
 
Cryptography- "A Black Art"
Cryptography- "A Black Art"Cryptography- "A Black Art"
Cryptography- "A Black Art"
 
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelA Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
steganography
steganographysteganography
steganography
 
Cryptography full report
Cryptography full reportCryptography full report
Cryptography full report
 
Cryptography
CryptographyCryptography
Cryptography
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first review
 
Networksecurity1 1
Networksecurity1 1 Networksecurity1 1
Networksecurity1 1
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Paper id 27201444
Paper id 27201444Paper id 27201444
Paper id 27201444
 
Cryptography saurabh
Cryptography saurabhCryptography saurabh
Cryptography saurabh
 
Steganography
SteganographySteganography
Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography Presentation
Cryptography PresentationCryptography Presentation
Cryptography Presentation
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

Destaque

大家一起學Python
大家一起學Python大家一起學Python
大家一起學PythonLun Dong
 
A0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccA0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccPrabhu Prabhu
 
Caso ejemplo oftalmologia latenció primària
Caso ejemplo oftalmologia latenció primàriaCaso ejemplo oftalmologia latenció primària
Caso ejemplo oftalmologia latenció primàriaformaciocamfic
 
Visual Resume
Visual ResumeVisual Resume
Visual ResumeMaxxClark
 
Maila rosario colleg (technical writing)
Maila  rosario colleg (technical writing)Maila  rosario colleg (technical writing)
Maila rosario colleg (technical writing)Jane Tumanguil
 
Nerissa Arendela Bocalan
Nerissa Arendela BocalanNerissa Arendela Bocalan
Nerissa Arendela BocalanErisse Vee
 
Adv420 final
Adv420 finalAdv420 final
Adv420 finalshipleyl
 
Chapter 2 Objectives of Performance appraisal
Chapter 2 Objectives of Performance appraisalChapter 2 Objectives of Performance appraisal
Chapter 2 Objectives of Performance appraisalmahmoodku
 
Toms Poetry Anthology
Toms Poetry AnthologyToms Poetry Anthology
Toms Poetry Anthologypun4000
 
системы счисления
системы счислениясистемы счисления
системы счисленияkozarezov94
 
Cdocumentsandsettingssompong y-hosal04nbmydocumentsprincipleofsuccess-1008080...
Cdocumentsandsettingssompong y-hosal04nbmydocumentsprincipleofsuccess-1008080...Cdocumentsandsettingssompong y-hosal04nbmydocumentsprincipleofsuccess-1008080...
Cdocumentsandsettingssompong y-hosal04nbmydocumentsprincipleofsuccess-1008080...Marie Caroline Estoque
 
4 cas traumatismes oculars
4 cas traumatismes oculars4 cas traumatismes oculars
4 cas traumatismes ocularsformaciocamfic
 
Performance Appraisal and its objectives by mahmood qasim
Performance  Appraisal and its objectives by mahmood qasimPerformance  Appraisal and its objectives by mahmood qasim
Performance Appraisal and its objectives by mahmood qasimmahmoodku
 

Destaque (20)

大家一起學Python
大家一起學Python大家一起學Python
大家一起學Python
 
4.3 Cas 3 tema 4
4.3  Cas 3 tema 4 4.3  Cas 3 tema 4
4.3 Cas 3 tema 4
 
A0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36ccA0 ad276c eacf-6f38-e32efa1adf1e36cc
A0 ad276c eacf-6f38-e32efa1adf1e36cc
 
Icd 10
Icd 10Icd 10
Icd 10
 
Prefix ber-
Prefix ber-Prefix ber-
Prefix ber-
 
Caso ejemplo oftalmologia latenció primària
Caso ejemplo oftalmologia latenció primàriaCaso ejemplo oftalmologia latenció primària
Caso ejemplo oftalmologia latenció primària
 
Visual Resume
Visual ResumeVisual Resume
Visual Resume
 
Maila rosario colleg (technical writing)
Maila  rosario colleg (technical writing)Maila  rosario colleg (technical writing)
Maila rosario colleg (technical writing)
 
Nerissa Arendela Bocalan
Nerissa Arendela BocalanNerissa Arendela Bocalan
Nerissa Arendela Bocalan
 
Adv420 final
Adv420 finalAdv420 final
Adv420 final
 
Slidecast final
Slidecast finalSlidecast final
Slidecast final
 
Chapter 2 Objectives of Performance appraisal
Chapter 2 Objectives of Performance appraisalChapter 2 Objectives of Performance appraisal
Chapter 2 Objectives of Performance appraisal
 
Toms Poetry Anthology
Toms Poetry AnthologyToms Poetry Anthology
Toms Poetry Anthology
 
системы счисления
системы счислениясистемы счисления
системы счисления
 
Slidecast
SlidecastSlidecast
Slidecast
 
Cdocumentsandsettingssompong y-hosal04nbmydocumentsprincipleofsuccess-1008080...
Cdocumentsandsettingssompong y-hosal04nbmydocumentsprincipleofsuccess-1008080...Cdocumentsandsettingssompong y-hosal04nbmydocumentsprincipleofsuccess-1008080...
Cdocumentsandsettingssompong y-hosal04nbmydocumentsprincipleofsuccess-1008080...
 
Lab8
Lab8Lab8
Lab8
 
4 cas traumatismes oculars
4 cas traumatismes oculars4 cas traumatismes oculars
4 cas traumatismes oculars
 
Performance Appraisal and its objectives by mahmood qasim
Performance  Appraisal and its objectives by mahmood qasimPerformance  Appraisal and its objectives by mahmood qasim
Performance Appraisal and its objectives by mahmood qasim
 
Galeria
GaleriaGaleria
Galeria
 

Semelhante a Ijcta2011020338

Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesMona Rajput
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYijcisjournal
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsLisa Brewer
 
Data Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano SystemsData Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano Systemsrinzindorjej
 
Cryptography And Embedded Systems Used
Cryptography And Embedded Systems UsedCryptography And Embedded Systems Used
Cryptography And Embedded Systems UsedCarla Bennington
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfssuserff72e4
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyAlexander Decker
 
CyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN
 
A novel approach for hiding data in
A novel approach for hiding data inA novel approach for hiding data in
A novel approach for hiding data inijwmn
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)newbie2019
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project reportRishab Gupta
 

Semelhante a Ijcta2011020338 (20)

Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
Evolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniquesEvolution of Cryptography and Cryptographic techniques
Evolution of Cryptography and Cryptographic techniques
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography Methods
 
319 325
319 325319 325
319 325
 
Data Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano SystemsData Security Through Crypto-Stegano Systems
Data Security Through Crypto-Stegano Systems
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography And Embedded Systems Used
Cryptography And Embedded Systems UsedCryptography And Embedded Systems Used
Cryptography And Embedded Systems Used
 
informationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdfinformationhiding-181103070958 (1).pdf
informationhiding-181103070958 (1).pdf
 
Information hiding
Information hidingInformation hiding
Information hiding
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
CyberGhost VPN Encryption Guide
CyberGhost VPN Encryption GuideCyberGhost VPN Encryption Guide
CyberGhost VPN Encryption Guide
 
A novel approach for hiding data in
A novel approach for hiding data inA novel approach for hiding data in
A novel approach for hiding data in
 
Cryptography
CryptographyCryptography
Cryptography
 
Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)Pertemuan 4 information hiding (cryptography)
Pertemuan 4 information hiding (cryptography)
 
Hi3612991303
Hi3612991303Hi3612991303
Hi3612991303
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 

Ijcta2011020338

  • 1. ISSN:2229-6093 A.Joseph Raphael,Dr.V Sundaram, Int. J. Comp. Tech. Appl., Vol 2 (3), 626-630 Cryptography and Steganography – A Survey A. Joseph Raphael Dr. V. Sundaram, Head & Director Research Scholar Department of Computer Applications Karpagam University Karpagam College of Engineering Coimbatore, India. Coimbatore, India. Abstract— Digital communication has become an essential private key that only the recipient of messages uses. In part of infrastructure nowadays, a lot of applications are Cryptography, a cipher message for instance, might Internet-based and it is important that communication be arouse suspicion on the part of the recipient while an made secret. As a result, the security of information passed invisible message created with steganographic methods over an open channel has become a fundamental issue and therefore, the confidentiality and data integrity are required to will not. In fact, steganography can be useful when the protect against unauthorized access and use. This has use of cryptography is forbidden: where cryptography resulted in an unstable growth in the field of information and strong encryption are outlawed, steganography can hiding. Cryptography and steganography are the two popular circumvent such policies to pass message covertly. methods available to provide security. One hides the However, steganography and cryptography differ in the existence of the message and the other distorts the message way they are evaluated: steganography fails when the itself. Using cryptography, the data is transformed into some ”enemy” is able to access the content of the cipher other gibberish form and then the encrypted data is message, while cryptography fails when the ”enemy” transmitted. In steganography, the data is embedded in an image file and the image file is transmitted. This paper detects that there is a secret message present in the focuses on the strength of combining cryptography and steganographic medium. stegnography methods to enhance the security of communication over an open channel. The disciplines that study techniques for deciphering cipher messages and detecting hide messages are called cryptanalysis and steganalysis. The former denotes the Index Terms—Stegano object, cryptanalysis, cipher text set of methods for obtaining the meaning of encrypted information, while the latter is the art of discovering covert messages. The aim of this paper is to describe a I INTRODUCTION method for integrating together cryptography and steganography through some media such as image, Cryptography and Steganography are well known and audio, video, etc. widely used techniques that manipulate information in order to cipher or hide their existence respectively. II HISTORY Steganography is the art and science of communicating in a way which hides the existence of the Cryptography has followed man through many stages communication. Cryptography scrambles a message so it of evolution [3]. Cryptography can be found as far back cannot be understood; the Steganography hides the as 1900 B.C. in ancient Egyptian scribe using non- message so it cannot be seen. Even though both methods standard hieroglyphics in an inscription. From 500 – 600 provide security, a study is made to combine both B.C. Hebrew scribes used ATBASH, a reversed alphabet cryptography and Steganography methods into one simple solution cipher. From 50 - 60 B.C. Julius Caesar system for better confidentiality and security. used a simple substitution with the normal alphabet in government communications. Cryptography continued Cryptography systems can be broadly classified into through history with may variations. Today cryptography symmetric-key systems that use a single key that both the has reached a new level, quantum cryptography. sender and the receiver have, and public-key systems that Quantum cryptography combines physics and use two keys, a public key known to everyone and a cryptography to produce a new cryptosystem that cannot 626
  • 2. ISSN:2229-6093 A.Joseph Raphael,Dr.V Sundaram, Int. J. Comp. Tech. Appl., Vol 2 (3), 626-630 be defeated without the sender and receiver having the Cryptanalysis [2] is the reverse engineering of knowledge of the attempted and failed intrusion. cryptography—attempts to identify weaknesses of Through the long history of cryptography, steganography various cryptographic algorithms and their was developed and flourished on its own. implementations to exploit them. Any attempt at cryptanalysis is defined as an attack. Steganography comes from the Greek steganos (covered or secret) and -graphy (writing or drawing). Cryptology encompasses both cryptography and Steganography can be defined as the hiding of cryptanalysis and looks at mathematical problems that information by embedding messages within other, underlie them. seemingly harmless messages, graphics or sounds. The first steganographic technique was developed in ancient Cryptosystems are computer systems used to encrypt Greece around 440 B.C. The Greek ruler Histaeus data for secure transmission and storage. employed an early version of steganography which involved: shaving the head of a slave, tattooing the Plaintext is message or data which are in their normal, message on the slaves scalp, waiting for the growth of readable (not crypted) form. hair to disclose the secret message, and sending the slave on his way to deliver the message. The recipient would Encryption: Encoding the contents of the message in have the slave’s head to uncover the message. The such a way that hides its contents from outsiders. recipient would reply in the same form of steganography. In the same time period, another early form of Cipher text results from plaintext by applying the steganography was employed. This method involved encryption key. Demerstus, who wrote a message to the Spartans warning of eminent invasions from Xerxes. The message was Decryption: The process of retrieving the plaintext back carved on the wood of wax tablet, and then covered with a fresh layer of wax. This seemingly blank tablet was from the cipher text. delivered with its hidden message successfully. Steganography continued development in the early 1600s Key: Encryption and decryption usually make use of a as Sir Francis Bacon used a variation in type face to carry key, and the coding method is such that decryption can each bit of the encoding. be performed only by knowing the proper key. The microdots were complete documents, pictures, and plans reduced in size to the size of a period and attached Steganography is the method of hiding secret messages to common paperwork. Null ciphers were also used to in an ordinary document. pass secret messages. Null ciphers are unencrypted messages with real messages embedded in the current Steganalysis could be simply defined as the detection of text. Hidden messages were hard to interpret within the steganography by a third party. innocent messages. An example of an innocent message containing a null cipher is: Hash functions generate a digest of the message. Fishing freshwater bends and saltwater coasts rewards Substitution cipher involves replacing an alphabet with anyone feeling stressed. Resourceful anglers usually find another character of the same alphabet set. masterful leapers fun and admit swordfish rank overwhelming any day. Mono-alphabetic system uses a single alphabetic set for substitutions. By taking the third letter in each word the following message emerges: Poly-alphabetic system uses multiple alphabetic sets for Send Lawyers, Guns, and Money. substitutions. III DEFINITION & TERMINOLOGY Caesar cipher is a mono-alphabetic system in which each Cryptography defines the art and science of transforming character is replaced by the third character in succession. data into a sequence of bits that appears as random and Julius Caesar used this method of encryption. meaningless to a side observer or attacker. 627
  • 3. ISSN:2229-6093 A.Joseph Raphael,Dr.V Sundaram, Int. J. Comp. Tech. Appl., Vol 2 (3), 626-630 A digital signature is a block of data that is generated by a two-key crypto system in which two parties could the sender of a message using his/her secret key. engage in a secure communication over a insecure communications channel without having to share a secret IV CRYPTOGRAPHY key. Cryptography is an important element of any strategy Digital Signature: The use of digital signature came from to address message transmission security requirements. the need of ensuring the authentication. The digital Cryptography is the study of methods of sending signature is more like stamp or signature of the sender messages in disguised form so that only the intended which is embedded together with the data and encrypts it recipients can remove the disguise and read the message. with the private key in order to send it to the other party. In addition, the signature assures that any change made to It is the practical art of converting messages or data into the data that has been signed is easy to detect by the a different form, such that no-one can read them without receiver. having access to the 'key'. The message may be converted using a 'code' (in which case each character or Hash Function: The hash function is a one way group of characters is substituted by an alternative one), encryption, the hash function is a well defined procedure or a 'cypher' or 'cipher' (in which case the message as a or mathematical formula that represents a small size of whole is converted, rather than individual bits which is generated from a large sized file, the result characters).Cryptology is the science underlying of this function can be called hash code or hashes. The cryptography. Cryptanalysis is the science of 'breaking' generating of hash code is faster than other methods or 'cracking' encryption schemes, i.e. discovering the which make it more desired for authentication and decryption key. Cryptographic systems are generically integrity. Cryptographic hash functions are much used classified along three independent dimensions [1]. for digital signature and cheap constructions are highly desirable. The use of cryptographic hash functions for 1. Methodology for transforming plain text to cipher text. message authentication has become a standard approach All encryption algorithms are based on two general in many applications, particularly internet security principles: substitution, in which each element in the protocols. The authentication and the integrity plaintext is mapped into another element, and considered as main issues in information security, the transposition, in which elements in the plaintext are hash code can be attached to the original file then at any rearranged. The fundamental requirement is that no time the users are able to check the authentication and information be lost. integrity after sending the secure data by applying the hash function to the message again and compare the 2. Methodology for number of keys used. result to the sender hash code, if it’s similar that is mean the message came from the original sender without There are some standards methods[4] which is used with altering because if there is any changed has been made to cryptography such as secret key, public key, digital the data will changed the hash code at the receiver side. signature and hash function. 3. Methodology for processing plain text. Secret Key (Symmetric): With secret key cryptography, a single key is used for both encryption and decryption. A block cipher processes the input one block of elements The sender uses the key to encrypt the plaintext and at a time, producing an output block for each input sends the cipher text to the receiver. The receiver applies block. A stream cipher processes the input elements the same key to decrypt the message and recover the continuously, producing output one element at a time, as plaintext. Because a single key is used for both it goes along. The proposed algorithm uses a substitution functions, secret key cryptography is also called as cipher method. It is a symmetric key algorithm using the symmetric encryption. technique of stream cipher. Public Key : Public key cryptography has been said to be the most significant new development in cryptography in the last 300-400 years. Modern Public Key Cryptography was first described publicly by Standford University professor Martin Hellman and graduate student Whitfield Diffie in 1976. Their study described 628
  • 4. ISSN:2229-6093 A.Joseph Raphael,Dr.V Sundaram, Int. J. Comp. Tech. Appl., Vol 2 (3), 626-630 V STEGANOGRAPHY According to dictionary.com: Steganography is:” Hiding a secret message within a larger one in such a way that The word steganography comes from the Greek others can not discern the presence or contents of the Steganos, which mean covered or secret and graphy hidden message” and Cryptography is “The process or means writing or drawing. Therefore, steganography skill of communicating in, or deciphering secret writing means, literally, covered writing. The main goal or or ciphers.” Steganography can be used to cloak hidden steganography is to communicate securely in a messages in image, audio and even text files. It has until completely undetectable manner and to avoid drawing recently been the poor cousin of cryptography. Now, it is suspicion to the transmission of a hidden data [4]. gaining new popularity with the current industry During the process, characteristics of these methods are demands for digital watermarking and fingerprinting of to change in the structure and features so as not to be audio and video. Steganography must not be confused identifiable by human eye. Digital images, videos, sound with cryptography, where we transform the message so files, and other computer files that contain perceptually as to make its meaning obscure to malicious people who irrelevant or redundant information can be used as intercept it. Therefore, the definition of breaking the “covers” or carriers to hide secret messages. After system is different. In cryptography, the system is broken embedding a secret message into the cover-image, a so- when the attacker can read the secret message. Breaking called stegoimage is obtained. The basic model of a steganographic system needs the attacker to detect that steganography consists of Carrier, Message, Embedding algorithm and Stego key. The model for steganography is steganography has been used and he is able to read the shown in Figure 1. Carrier is also known as a cover- embedded message. In addition, the security of classical object, which embeds the message and serves to hide its steganography system relies on secrecy of the data presence. encoding system. Once the encoding system is known, the steganography system is defeated. The distinction between cryptography and steganography is an important one, and is summarized by the following table. Fig. 1. A model of Steganography Capacity, security and robustness are three different aspects affecting steganography and its usefulness. Capacity refers to the amount of information that can be hidden in the cover medium. Security relates to an eavesdropper’s inability to detect hidden information and robustness is the amount of modification the stego medium can withstand before an adversary can destroy the hidden information. VI STEGANOGRAPHY VS CRYPTOGRAPHY Basically, the purpose of cryptography and steganography is to provide secret communication. 629
  • 5. ISSN:2229-6093 A.Joseph Raphael,Dr.V Sundaram, Int. J. Comp. Tech. Appl., Vol 2 (3), 626-630 VII COMBINED CRYPTO-STEGANOGRAPHY The idea of this type is to encrypt the secret message or data by secret key approach and to hide the encrypted Steganography is not the same as cryptography Data data within cover carrier. hiding techniques have been widely used to transmission of hiding secret message for long time. Ensuring data Public Key Steganography: The last type of security is a big challenge for computer users. Business steganography is to combine the public key cryptography men, professionals, and home users all have some approach and the steganography approach. The idea of important data that they want to secure from others. this type is to encrypt the secret data using the public key Even though both methods provide security, to add approach and then hide the encrypted data within cover multiple layers of security it is always a good practice to carrier. use Cryptography and Steganography together. By REFERENCES combining, the data encryption can be done by a software and then embed the cipher text in an image or any other media with the help of stego key. The [1] Neha Sharma, J.S. Bhatia and Dr. Neena Gupta, “ An combination of these two methods will enhance the Encrypto-Stego Technique Based secure data Transmission System”, PEC, Chandigarh. security of the data embedded. This combined chemistry will satisfy the requirements such as capacity, security [2] I. Venkata Sai Manoj, “Cryptography and Steganography”, and robustness for secure data transmission over an open International Journal of Computer Applications (0975 – channel. 8887), Volume 1 – No.12 [3] Alan Siper, Roger Farley and Craig Lombardo, “The Rise of Steganography”, Proceedings of Student/Faculty A pictorial representation of the combined concept of Research Day, CSIS, Pace University, May 6th, 2005. cryptography and steganography is depicted in figure 2. [4] B B Zaidan, A.A Zaidan, A.K. Al-Frajat and H.A. Jalab, “On the Differences between Hiding Information and Cryptography Techniques: An Overview”, Journal of Applied Sciences 10(15): 1650-1655, 2010 [5] Domenico Bloisi and Luca Iocchi, “Image Based Steganography and Cryptography”, Sapienza University of Rome, Italy. [6] Kallam Ravindra Babu, Dr. S.Udaya Kumar, Dr. A.Vinaya Babu, “A Survey on Cryptography and Steganography Methods for Information Security”, Internaltional Journal of Computer Applications(0975-8887), Volume 12 – No. 2, November 2010. [7] Dipti Kapoor Sarmah, Neha bajpai, “ Proposed System for In figure 2, both the methods are combined by Data Hhiding Using Cryptography and Steganography”, encrypting message using cryptography and then hiding International Journal of Computer Applications (0975 – the encrypted message using steganography. The 8887), Volume 8 – No. 9, October 2010. resulting stego-image can be transmitted without [8] Eiji Kawaguchi and Richard O. Eason, “Principle revealing that secret information is being exchanged. and applications of BPCS-Steganography”, Kyushu Furthermore, even if an attacker were to defeat the Institute of Technology, Kitakyushu, Japan, steganographic technique to detect the message from the University of Maine, Orono, Maine 04469-5708. stego-object, he would still require the cryptographic [9]Sashikala Channalli and Ajay Jadhav, “Steganography decoding key to decipher the encrypted message. Since An Art of Hiding Data”, International Journal on then, the steganography approaches can be divided into Computer Science and Engineering Vol.1(3), 2009, three types [4]: 137-141. Pure Steganography: This technique simply uses the steganography approach only without combining other methods. It is working on hiding information within cover carrier. Secret Key steganography: The secret key steganography use the combination of the secret key cryptography technique and the steganography approach. 630