Cargando…

Double layer security using crypto-stego techniques: a comprehensive review

Recent advancement in the digital technology and internet has facilitated usage of multimedia objects for data communication. However, interchanging information through the internet raises several security concerns and needs to be addressed. Image steganography has gained huge attention from researc...

Descripción completa

Detalles Bibliográficos
Autores principales: Jan, Aiman, Parah, Shabir A., Hussan, Muzamil, Malik, Bilal A.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer Berlin Heidelberg 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8512592/
https://www.ncbi.nlm.nih.gov/pubmed/34660167
http://dx.doi.org/10.1007/s12553-021-00602-1
_version_ 1784583031672012800
author Jan, Aiman
Parah, Shabir A.
Hussan, Muzamil
Malik, Bilal A.
author_facet Jan, Aiman
Parah, Shabir A.
Hussan, Muzamil
Malik, Bilal A.
author_sort Jan, Aiman
collection PubMed
description Recent advancement in the digital technology and internet has facilitated usage of multimedia objects for data communication. However, interchanging information through the internet raises several security concerns and needs to be addressed. Image steganography has gained huge attention from researchers for data security. Image steganography secures the data by imperceptibly embedding data bits into image pixels with a lesser probability of detection. Additionally, the encryption of data before embedding provides double-layer protection from the potential eavesdropper. Several steganography and cryptographic approaches have been developed so far to ensure data safety during transmission over a network. The purpose of this work is to succinctly review recent progress in the area of information security utilizing combination of cryptography and steganography (crypto-stego) methods for ensuring double layer security for covert communication. The paper highlights the pros and cons of the existing image steganography techniques and crypto-stego methods. Further, a detailed description of commonly using evaluations parameters for both steganography and cryptography, are given in this paper. Overall, this work is an attempt to create a better understanding of image steganography and its coupling with the encryption methods for developing state of art double layer security crypto-stego systems.
format Online
Article
Text
id pubmed-8512592
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher Springer Berlin Heidelberg
record_format MEDLINE/PubMed
spelling pubmed-85125922021-10-13 Double layer security using crypto-stego techniques: a comprehensive review Jan, Aiman Parah, Shabir A. Hussan, Muzamil Malik, Bilal A. Health Technol (Berl) Review Paper Recent advancement in the digital technology and internet has facilitated usage of multimedia objects for data communication. However, interchanging information through the internet raises several security concerns and needs to be addressed. Image steganography has gained huge attention from researchers for data security. Image steganography secures the data by imperceptibly embedding data bits into image pixels with a lesser probability of detection. Additionally, the encryption of data before embedding provides double-layer protection from the potential eavesdropper. Several steganography and cryptographic approaches have been developed so far to ensure data safety during transmission over a network. The purpose of this work is to succinctly review recent progress in the area of information security utilizing combination of cryptography and steganography (crypto-stego) methods for ensuring double layer security for covert communication. The paper highlights the pros and cons of the existing image steganography techniques and crypto-stego methods. Further, a detailed description of commonly using evaluations parameters for both steganography and cryptography, are given in this paper. Overall, this work is an attempt to create a better understanding of image steganography and its coupling with the encryption methods for developing state of art double layer security crypto-stego systems. Springer Berlin Heidelberg 2021-10-13 2022 /pmc/articles/PMC8512592/ /pubmed/34660167 http://dx.doi.org/10.1007/s12553-021-00602-1 Text en © IUPESM and Springer-Verlag GmbH Germany, part of Springer Nature 2021 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Review Paper
Jan, Aiman
Parah, Shabir A.
Hussan, Muzamil
Malik, Bilal A.
Double layer security using crypto-stego techniques: a comprehensive review
title Double layer security using crypto-stego techniques: a comprehensive review
title_full Double layer security using crypto-stego techniques: a comprehensive review
title_fullStr Double layer security using crypto-stego techniques: a comprehensive review
title_full_unstemmed Double layer security using crypto-stego techniques: a comprehensive review
title_short Double layer security using crypto-stego techniques: a comprehensive review
title_sort double layer security using crypto-stego techniques: a comprehensive review
topic Review Paper
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8512592/
https://www.ncbi.nlm.nih.gov/pubmed/34660167
http://dx.doi.org/10.1007/s12553-021-00602-1
work_keys_str_mv AT janaiman doublelayersecurityusingcryptostegotechniquesacomprehensivereview
AT parahshabira doublelayersecurityusingcryptostegotechniquesacomprehensivereview
AT hussanmuzamil doublelayersecurityusingcryptostegotechniquesacomprehensivereview
AT malikbilala doublelayersecurityusingcryptostegotechniquesacomprehensivereview