International Journal of Computer Applications
"The most powerful and common approaches to countering the threats to network/information security are encryption and steganography. Encryption is based on number of substitutions, transpositions the authors perform on the plaintext, converted plain text is treated as cipher text and a process of converting is called cryptography. This paper deals with the tidings of cryptography in history, how it has played a vital role in World War -1, World War-2. It also deals with the substitution, transposition cryptographic techniques and steganography principles which can be used to maintain the confidentiality of computerized and none computerized information files."