Main Article Content

Manoj Kumar Ramaiya
Dr. Dinesh Goyal
Dr. Naveen Hemrajani


The aegis of data over unsecure transmission network has continually a key concern in the consideration of cyber professionals. With the expeditious promising practice of the cyber world in all personnel and professional drives, the distress for the unauthorized ingression and later exploitation by an intruder, has further put pressure on the industry or researchers for developed new methods and techniques to bulwark the information from intruders involves in cybercrime.
Cryptography is the art dealt with the converting a confidential information into inaudible forms. This unintelligible information might engender distrustful in the mind of opponents when it transfers on insecure communication media and only valid recipient can only by decoding it. Conversely, Steganography embed confidential information in to a cover image and hides its subsistence. As a mundane hiding of secrete data is apply in communication on text, image or multimedia contents digital signature and authentication.
Mutually Cryptographic and Steganographic methods distributes the satisfactory security but are vulnerable to attackers when information flow over insecure communication media. Efforts to amalgamate these techniques i.e. Steganography and Cryptography, gives the ultimate results in security improvement. The steganographic techniques currently used mainly accentuation on embedding mechanism with less consideration to pre-processing of confidential information. The advantage of pre-processing offer robustness, high security level and flexibility in the safety system


Download data is not yet available.

Article Details



N. Provos and P. Honeyman, “Hide and Seek: an Introduction to Steganographyâ€, IEEE Security and Privacy Vol 1 No. 3, pp.32–44, 2003.

Ross J. Anderson and Fabien A.P. Petitcolas, “On The Limits of Steganographyâ€, IEEE Journal of Selected Areas in Communications, Vol. 16 No. 4,pp 474-481, May 1998.

J.C.Judge, “Steganography: past, present, futureâ€, SANS Institute publication, /, 2001.

Shouchao Song, Jie Zhang, Xin Liao, Jiao Du and Qiaoyan Wen, “A Novel Secure Communication Protocol Combining Steganography and Cryptographyâ€, Advanced in Control Engineering and Information Science , Procedia Engineering 15 , pp. 2767 – 2772, 2011.

Ajit Singh and Swati Malik, “ Securing Data by Using Cryptography with Steganographyâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 5, pp 404-409 , May 2013.

Dhawal Seth, L. Ramanathan and Abhishek Pandey, “Security Enhancement: Combining Cryptography and Steganographyâ€, International Journal of Computer Applications (0975 – 8887) Volume 9– No.11, pp. 3-6, Nov 2010.

Khalil Challita and Hikmat Farhat, “Combining Steganography and Cryptography: New Directionsâ€, International Journal on New Computer Architectures and Their Applications (IJNCAA) Vol. 1 No., pp.199-208, 2011.

Ankit Uppal, Rajni Sehgal, Renuka Ngapal and Aakash Gupta, “Merging Cryptography& Steganography Combination of Cryptography: Rc6 Enhanced Ciphering and Steganography: JPEGâ€, International Journal of Advanced Computational Engineering and Networking, Vol. 2, Issue-10, pp. 85-87, Oct.-2014.

Dipti Kapoor Sarmah and Neha Bajpai, “Proposed System for Data Hiding Using Cryptographyand Steganographyâ€, International Journal of Computer Applications (0975 – 8887) Volume 8– No.9, pp. 7- 10, Oct 2010.

Pye Pye Aung and Tun Min Naing, “ Novel Secure Combination Technique of Steganography and Cryptographyâ€, International Journal of Information Technology, Modeling and Computing (IJITMC), Vol. 2, No. 1. Pp 55-62, February 2014.

William M. Daley and Raymond G. Kammer, “Data Encryption Standard (DES)â€, Federal Information Processing Standards Publication FIPS Pub 46-3 National Institute Of Standards And Technology, pp. 1-22, 25 October 1999.

Manoj Kumar Ramaiya, Naveen Hemrajani and Anil Kishore Saxena, “Improvisation of Security aspect in Steganography applying DES â€, IEEE International Conference on Communication Systems and Network Technologies (CSNT – 2013) , pp. 431 – 436, 2013.

Po-Yueh Chen and Hung-Ju Lin, “A DWT Based Approach for Image Steganographyâ€, International Journal of Applied Science and Engineering 4, 3: 275-290, 2006.