This paper is published in Volume-3, Issue-2, 2017
Area
Cryptography and Steganography
Author
Lakshay Thakur, Roshan Lal Chokkar
Org/Univ
Computer Science And Engineering, Amity University, Noida, India
Pub. Date
03 May, 2017
Paper ID
V3I2-1531
Publisher
Keywords
Security, Steganography, Cryptography, Encryption, Decryption, Data Protection.

Citationsacebook

IEEE
Lakshay Thakur, Roshan Lal Chokkar. Comparison of Crystographic Techniques, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Lakshay Thakur, Roshan Lal Chokkar (2017). Comparison of Crystographic Techniques. International Journal of Advance Research, Ideas and Innovations in Technology, 3(2) www.IJARIIT.com.

MLA
Lakshay Thakur, Roshan Lal Chokkar. "Comparison of Crystographic Techniques." International Journal of Advance Research, Ideas and Innovations in Technology 3.2 (2017). www.IJARIIT.com.

Abstract

The study of hiding information is referred to as cryptography. When communicating over the untrusted med. Such as the internet it becomes very important to protect the sensitive information and hence cryptography plays a crucial role there. It is the study of hiding of info. Over an untrusted medium like the internet where it becomes compulsory to protect the information from the third party or the eavesdropper. On the other hand, steganography provides a cover or a protection layer to the sensitive information being transferred. Steganography deals with the composting of hidden messages so that only the sender is aware of the message being sent and if the third party tries to interferes he/she gets nothing but the cover medium being developed with the help of steganography. There have been many logical combinations of steganographic techniques which result in efficient protection for any content to be transferred. In this paper, we try to try out some of the famous combination of steganographic techniques and result out the best of them in terms of speed efficiency, security, and reliability for the user.