Open Access Open Access  Restricted Access Subscription Access

A Survey on Cryptography and Steganography

Pushpanjali Pandey, BM Singh


The two most significant security aspects that deal with the transmitting knowledge or information over various medium for example Internet are steganography and also cryptography. Steganography deals with the hiding the presence of an information and cryptography deals with the hiding the data contents. Both of them are used to confirm security. But none of them can be easily complete the basic need of security, i.e., the services like as capacity, robustness and undetectability etc. So, a novel technique based on combination of both steganography and cryptography called as Crypto-Steganography which overcome all other’s weaknesses and create difficult for the intruders to attack or steal most sensitive knowledge is being proposed. This paper also defines the basics idea of steganography and also cryptography on the basis of earlier literatures available on the topic. Now a days sharing the information over internet is becoming a critical issue due to security problems. Hence, more techniques are needed to protect the shared data in an unsecured channel. The present work focus on combination of cryptography and steganography to secure the data while transmitting in the network. Firstly, the data, which is to be transmitted from sender to receiver in the network, must be encrypted using the encrypted algorithm in cryptography.

Cite this Article
Pushpanjali Pandey, B.M Singh. A Survey on Cryptography and Steganography. Recent Trends in Programming Languages. 2015; 2(3): 5–13p.


Steganography, cryptography, data, security, algorithm

Full Text:



Mateti P. A laboratory-based course on internet security. Proc. Of 34th SIGCSE Technical Symp, on Computer Science Education, ACM. 2003; 35(1): 252–256p.

Available at: http:/

Susan J Lincke, Andrew Hollan. Network security: focus on security, skills and stability. Proceedings of 37th ASEE/IEEE Frontiers in Education Conference. 2007; 10–15p.

Othman O Khalifa, MD Rafiqul Islam, Khan S et al. Communication cryptography. 2004 RF and Microwave Conference, Subang, Selangor, Malaysia.

Shivangi Goyal. A survey on the applications of cryptography. International Journal of Science and Technology. 2012; 1(3): 137–140p.

Milton Joe M, Ramakrishnan B. Enhancing security module to prevent data hacking in online social networks. Journal of Emerging Technologies in Web Intelligence. 2014; 6(2): 184–191p.

Dolvara Gunatilaka. A survey of privacy and security issues in social networks. Available at:

Flesher J. How to clean up your digital dirt before it trashes your job search. In the Internet Engineering Task Force. 2006.

Fuller A. Employers snoop on facebook. In the Stanford Daily. 2006.

Balachander Krishnamurthy, Craig E Wills. Characterizing privacy in online social networks. WOSN '08 Proceedings of the First Workshop on Online Social Networks. 2008; 37–42p.

Satish N Chalurkari, Nileshkhochare, Mashram BB. Survey on modular attack on RSA algorithm. International Journal of Computational Engineering & Management. 2011; 14: 106–110p.

Cryptography and network security. Express Learning, ITL Education Solution Ltd.

Mona Sharifnejad, Mohsen Sharifi, Mansoureh Ghiasabadi et al. A survey on wireless sensor networks security. International Journal of Communication Networks and Information Security 2007; 1(2): 1–7p.

William Stallings. Cryptography and Network Security:Principles & Practices, 2nd Edn.

Dimple. Encryption using different techniques: A review. International Journal in Multidisciplinary and Academic Research (SSIJMAR). 2013; 2(1): 30–34p.

Akhil Behl. Emerging security challenges in cloud computing. IEEE World Congress on Information and Communication Technologies. 2011; 217–222p.

Maha Tebaa, Saïd El Hajji, Abdellatif El Ghazi. Homomorphic encryption applied to the cloud computing security. World Congress on Engineering. 2012; 1.

Devi G, Pramod Kumar M. Cloud computing: A CRM service based on a separate encryption and decryption using blowfish algorithm. International Journal of Computer Trends and Technology. 2012; 3(4): 592–596p.


  • There are currently no refbacks.

This site has been shifted to