A Survey on Cryptography and Steganography Methods for Information Security

Download Now
Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
"The most powerful and common approaches to countering the threats to network/information security are encryption and steganography. Encryption is based on number of substitutions, transpositions the authors perform on the plaintext, converted plain text is treated as cipher text and a process of converting is called cryptography. This paper deals with the tidings of cryptography in history, how it has played a vital role in World War -1, World War-2. It also deals with the substitution, transposition cryptographic techniques and steganography principles which can be used to maintain the confidentiality of computerized and none computerized information files."
Download Now

Find By Topic