Open Access Open Access  Restricted Access Subscription or Fee Access

Cryptography & Steganography

Shibin J Raj, N.Suresh Singh, A.R. Sajeev Ambi, M. Sreelal


Now the days the digital communication is used for transfer the data from one place to another. So it is important that message should keep its secret. In this purpose we have to use any kind of security method. The highly confidential data should keep its secret. It should not be accessed by unauthorized persons. So we have to adopt any kind of security method to send such data on open channels. To send highly confidential data as secure way we can use two methods cryptography and steganography. In cryptography the message is converted into some other gibberish forms, and then the encrypted data sends to destination. In steganography the message is hiding in some media and it is transferred to the destination. Both ensure the security.


Cryptography, Steganography, Cipher Text, Covermedia.

Full Text:



Steganography and Steganalysis: Different Approaches by Soumyendu Das, Subhendu Das, Bijoy Bandyopadhyay, Sugata Sanyal.

Cryptography and Steganography – A Survey by A.Joseph Raphael,Dr.V Sundaram, Int. J. Comp. Tech. Appl., Vol 2 (3), 626-630 ISSN:2229-6093

Cryptography - Wikipedia, the free encyclopedia.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.