Cargando…
Double layer security using crypto-stego techniques: a comprehensive review
Recent advancement in the digital technology and internet has facilitated usage of multimedia objects for data communication. However, interchanging information through the internet raises several security concerns and needs to be addressed. Image steganography has gained huge attention from researc...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer Berlin Heidelberg
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8512592/ https://www.ncbi.nlm.nih.gov/pubmed/34660167 http://dx.doi.org/10.1007/s12553-021-00602-1 |
_version_ | 1784583031672012800 |
---|---|
author | Jan, Aiman Parah, Shabir A. Hussan, Muzamil Malik, Bilal A. |
author_facet | Jan, Aiman Parah, Shabir A. Hussan, Muzamil Malik, Bilal A. |
author_sort | Jan, Aiman |
collection | PubMed |
description | Recent advancement in the digital technology and internet has facilitated usage of multimedia objects for data communication. However, interchanging information through the internet raises several security concerns and needs to be addressed. Image steganography has gained huge attention from researchers for data security. Image steganography secures the data by imperceptibly embedding data bits into image pixels with a lesser probability of detection. Additionally, the encryption of data before embedding provides double-layer protection from the potential eavesdropper. Several steganography and cryptographic approaches have been developed so far to ensure data safety during transmission over a network. The purpose of this work is to succinctly review recent progress in the area of information security utilizing combination of cryptography and steganography (crypto-stego) methods for ensuring double layer security for covert communication. The paper highlights the pros and cons of the existing image steganography techniques and crypto-stego methods. Further, a detailed description of commonly using evaluations parameters for both steganography and cryptography, are given in this paper. Overall, this work is an attempt to create a better understanding of image steganography and its coupling with the encryption methods for developing state of art double layer security crypto-stego systems. |
format | Online Article Text |
id | pubmed-8512592 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | Springer Berlin Heidelberg |
record_format | MEDLINE/PubMed |
spelling | pubmed-85125922021-10-13 Double layer security using crypto-stego techniques: a comprehensive review Jan, Aiman Parah, Shabir A. Hussan, Muzamil Malik, Bilal A. Health Technol (Berl) Review Paper Recent advancement in the digital technology and internet has facilitated usage of multimedia objects for data communication. However, interchanging information through the internet raises several security concerns and needs to be addressed. Image steganography has gained huge attention from researchers for data security. Image steganography secures the data by imperceptibly embedding data bits into image pixels with a lesser probability of detection. Additionally, the encryption of data before embedding provides double-layer protection from the potential eavesdropper. Several steganography and cryptographic approaches have been developed so far to ensure data safety during transmission over a network. The purpose of this work is to succinctly review recent progress in the area of information security utilizing combination of cryptography and steganography (crypto-stego) methods for ensuring double layer security for covert communication. The paper highlights the pros and cons of the existing image steganography techniques and crypto-stego methods. Further, a detailed description of commonly using evaluations parameters for both steganography and cryptography, are given in this paper. Overall, this work is an attempt to create a better understanding of image steganography and its coupling with the encryption methods for developing state of art double layer security crypto-stego systems. Springer Berlin Heidelberg 2021-10-13 2022 /pmc/articles/PMC8512592/ /pubmed/34660167 http://dx.doi.org/10.1007/s12553-021-00602-1 Text en © IUPESM and Springer-Verlag GmbH Germany, part of Springer Nature 2021 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Review Paper Jan, Aiman Parah, Shabir A. Hussan, Muzamil Malik, Bilal A. Double layer security using crypto-stego techniques: a comprehensive review |
title | Double layer security using crypto-stego techniques: a comprehensive review |
title_full | Double layer security using crypto-stego techniques: a comprehensive review |
title_fullStr | Double layer security using crypto-stego techniques: a comprehensive review |
title_full_unstemmed | Double layer security using crypto-stego techniques: a comprehensive review |
title_short | Double layer security using crypto-stego techniques: a comprehensive review |
title_sort | double layer security using crypto-stego techniques: a comprehensive review |
topic | Review Paper |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8512592/ https://www.ncbi.nlm.nih.gov/pubmed/34660167 http://dx.doi.org/10.1007/s12553-021-00602-1 |
work_keys_str_mv | AT janaiman doublelayersecurityusingcryptostegotechniquesacomprehensivereview AT parahshabira doublelayersecurityusingcryptostegotechniquesacomprehensivereview AT hussanmuzamil doublelayersecurityusingcryptostegotechniquesacomprehensivereview AT malikbilala doublelayersecurityusingcryptostegotechniquesacomprehensivereview |