Network Security Using Cryptography and Steganography

Download Now
Provided by: IJAIR
Topic: Security
Format: PDF
Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. These techniques have many applications in computer science and other related fields. They are used to protect email messages, credit card information, corporate data, etc. In this paper, the authors describe a method for integrating together cryptography and steganography through image processing. In particular, they present a system that able to perform steganography and cryptography at the same time using images as cover objects for steganography and as keys for cryptography.
Download Now

Find By Topic