Manoj Kumar Ramaiya, Dr. Dinesh Goyal, Dr. Naveen Hemrajani


The aegis of data over unsecure transmission network has continually a key concern in the consideration of cyber professionals. With the expeditious promising practice of the cyber world in all personnel and professional drives, the distress for the unauthorized ingression and later exploitation by an intruder, has further put pressure on the industry or researchers for developed new methods and techniques to bulwark the information from intruders involves in cybercrime.
Cryptography is the art dealt with the converting a confidential information into inaudible forms. This unintelligible information might engender distrustful in the mind of opponents when it transfers on insecure communication media and only valid recipient can only by decoding it. Conversely, Steganography embed confidential information in to a cover image and hides its subsistence. As a mundane hiding of secrete data is apply in communication on text, image or multimedia contents digital signature and authentication.
Mutually Cryptographic and Steganographic methods distributes the satisfactory security but are vulnerable to attackers when information flow over insecure communication media. Efforts to amalgamate these techniques i.e. Steganography and Cryptography, gives the ultimate results in security improvement. The steganographic techniques currently used mainly accentuation on embedding mechanism with less consideration to pre-processing of confidential information. The advantage of pre-processing offer robustness, high security level and flexibility in the safety system


Cryptography, DES, Multiple Encryption, Digital Image Steganography, Discrete Wavelet Transforms.

Full Text:



N. Provos and P. Honeyman, “Hide and Seek: an Introduction to Steganography”, IEEE Security and Privacy Vol 1 No. 3, pp.32–44, 2003.

Ross J. Anderson and Fabien A.P. Petitcolas, “On The Limits of Steganography”, IEEE Journal of Selected Areas in Communications, Vol. 16 No. 4,pp 474-481, May 1998.

J.C.Judge, “Steganography: past, present, future”, SANS Institute publication, /, 2001.

Shouchao Song, Jie Zhang, Xin Liao, Jiao Du and Qiaoyan Wen, “A Novel Secure Communication Protocol Combining Steganography and Cryptography”, Advanced in Control Engineering and Information Science , Procedia Engineering 15 , pp. 2767 – 2772, 2011.

Ajit Singh and Swati Malik, “ Securing Data by Using Cryptography with Steganography”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 5, pp 404-409 , May 2013.

Dhawal Seth, L. Ramanathan and Abhishek Pandey, “Security Enhancement: Combining Cryptography and Steganography”, International Journal of Computer Applications (0975 – 8887) Volume 9– No.11, pp. 3-6, Nov 2010.

Khalil Challita and Hikmat Farhat, “Combining Steganography and Cryptography: New Directions”, International Journal on New Computer Architectures and Their Applications (IJNCAA) Vol. 1 No., pp.199-208, 2011.

Ankit Uppal, Rajni Sehgal, Renuka Ngapal and Aakash Gupta, “Merging Cryptography& Steganography Combination of Cryptography: Rc6 Enhanced Ciphering and Steganography: JPEG”, International Journal of Advanced Computational Engineering and Networking, Vol. 2, Issue-10, pp. 85-87, Oct.-2014.

Dipti Kapoor Sarmah and Neha Bajpai, “Proposed System for Data Hiding Using Cryptographyand Steganography”, International Journal of Computer Applications (0975 – 8887) Volume 8– No.9, pp. 7- 10, Oct 2010.

Pye Pye Aung and Tun Min Naing, “ Novel Secure Combination Technique of Steganography and Cryptography”, International Journal of Information Technology, Modeling and Computing (IJITMC), Vol. 2, No. 1. Pp 55-62, February 2014.

William M. Daley and Raymond G. Kammer, “Data Encryption Standard (DES)”, Federal Information Processing Standards Publication FIPS Pub 46-3 National Institute Of Standards And Technology, pp. 1-22, 25 October 1999.

Manoj Kumar Ramaiya, Naveen Hemrajani and Anil Kishore Saxena, “Improvisation of Security aspect in Steganography applying DES ”, IEEE International Conference on Communication Systems and Network Technologies (CSNT – 2013) , pp. 431 – 436, 2013.

Po-Yueh Chen and Hung-Ju Lin, “A DWT Based Approach for Image Steganography”, International Journal of Applied Science and Engineering 4, 3: 275-290, 2006.



  • There are currently no refbacks.

Copyright (c) 2017 International Journal of Advanced Research in Computer Science