Skip to main content
Log in

A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

During the last few decades, digital communication has played a vital role in various sectors such as healthcare departments, banking, information technology companies, industries, and other fields. Nowadays, all data are transmitted over the Internet, which needs high protection for transmitting the original data from source to destination. In order to secure digital communication, cryptography and steganography methods are used to achieve data security over insecure and open networks like the Internet. Cryptography is the method of encrypting secret information in an unreadable structure. Based on the cryptography method, the original message can be distorted before data transmission. On the other hand, steganography covers secret data such as audio, image, text, and video. It can hide the message while transmitting the original information from one end to another. The data combines images, texts, audio and videos, which are communicated worldwide through the Internet. This review paper gives an analysis based on the concept of cryptography and steganography. It also presents a comparative approach using several encryption algorithms with several factors such as block size, key size, encryption speed, memory usage, and security level.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Availability of Data and Materials

No data Availability.

References

  1. Balaji, R., & Naveen, G. (2011). Secure data transmission using video Steganography. In 2011 IEEE International Conference on Electro/Information Technology, IEEE, pp. 1–5.

  2. Vijayakumar, P., Azees, M., Kannan, A., & Deborah, L. J. (2015). Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17(4), 1015–1028.

    Article  Google Scholar 

  3. Ozdemir, S., & Xiao, Y. (2009). Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks, 53(12), 2022–2037.

    Article  MATH  Google Scholar 

  4. Zhang, X. (2011). Reversible data hiding in encrypted image. IEEE Signal Processing Letters, 18(4), 255–258.

    Article  Google Scholar 

  5. Jung, K. H., & Yoo, K. Y. (2009). Data hiding method using image interpolation. Computer Standards and Interfaces, 31(2), 465–470.

    Article  Google Scholar 

  6. Zhou, X., & Tang, X. (2011). Research and implementation of RSA algorithm for encryption and decryption. In Proceedings of 2011 6th international forum on strategic technology IEEE, vol. 2, pp. 1118–1121.

  7. Elbirt, A. J., & Paar, C. (2005). An instruction-level distributed processor for symmetric-key cryptography. IEEE Transactions on Parallel and distributed Systems, 16(5), 468–480.

    Article  Google Scholar 

  8. Chatterjee, D., Nath, J., Dasgupta, S., & Nath, A. (2011). A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm. In 2011 International conference on communication systems and network technologies, pp. 89–94. IEEE.

  9. Nath, A., Ghosh, S., & Mallick, M. A. (2010). Symmetric Key Cryptography Using Random Key Generator. In Security and Management, pp. 234–242.

  10. Chandra, S., Paira, S., Alam, S. S., & Sanyal, G. (2014). A comparative survey of symmetric and asymmetric key cryptography. In 2014 international conference on electronics, communication and computational engineering (ICECCE), IEEE, pp. 83–93.

  11. Singh, K. K., & Dwivedi, S. (2014). Digital Watermarking using Asymmetric Key Cryptography and Spatial Domain Technique. International Journal of Advance Research in Computer Science and Management Studies, 2(8), 1–15.

    Google Scholar 

  12. Jirwan, N., Singh, A., & Vijay, S. (2013). Review and analysis of cryptography techniques. International Journal of Scientific and Engineering Research, 4(3), 1–6.

    Google Scholar 

  13. Wang, X., Wang, X., Zhao, J., & Zhang, Z. (2011). Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dynamics, 63(4), 587–597.

    Article  MathSciNet  Google Scholar 

  14. Doz, Y. L., & Kosonen, M. (2010). Embedding strategic agility: A leadership agenda for accelerating business model renewal. Long range planning, 43(2–3), 370–382.

    Article  Google Scholar 

  15. Wu, S., Huang, J., Huang, D., & Shi, Y. Q. (2005). Efficiently self-synchronized audio watermarking for assured audio data transmission. IEEE Transactions on Broadcasting, 51(1), 69–76.

    Article  Google Scholar 

  16. Neumann, K., Herold, M., Hartley, A., & Schmullius, C. (2007). Comparative assessment of CORINE2000 and GLC2000: Spatial analysis of land cover data for Europe. International Journal of Applied Earth Observation and Geoinformation, 9(4), 425–437.

    Article  Google Scholar 

  17. Dulera, S., Jinwala, D., & Dasgupta, A. (2012). Experimenting with the novel approaches in text steganography. arXiv preprint arXiv:1203.3644 .

  18. Thangadurai, K., & Devi, G. S. (2014). An analysis of LSB based image steganography techniques. In 2014 International Conference on Computer Communication and Informatics, IEEE, pp. 1–4.

  19. Sun, Y., & Liu, F. (2010). Selecting cover for image steganography by correlation coefficient. In 2010 second international workshop on education technology and computer science, IEEE, vol. 2, pp. 159–162.

  20. Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal processing, 90(3), 727–752.

    Article  MATH  Google Scholar 

  21. Amirtharajan, R., Akila, R., & Deepikachowdavarapu, P. (2010). A comparative analysis of image steganography. International journal of computer applications, 2(3), 41–47.

    Article  Google Scholar 

  22. Bhowal, K., Bhattacharyya, D., Jyoti Pal, A., & Kim, T. H. (2013). A GA based audio steganography with enhanced security. Telecommunication Systems, 52(4), 2197–2204.

    Article  Google Scholar 

  23. Nehru, G., & Dhar, P. (2012). A detailed look of audio steganography techniques using LSB and genetic algorithm approach. International Journal of Computer Science Issues (IJCSI), 9(1), 402.

    Google Scholar 

  24. Kumar, S., Barnali, B. A. N. D. Y. O. P. A. D. H. Y. A. Y., & Banik, G. U. P. T. A. (2012). LSB modification and phase encoding technique of audio steganography revisited. International Journal of Advanced Research in Computer and Communication Engineering, 1(4), 1–4.

    Google Scholar 

  25. Balgurgi, P. P., & Jagtap, S. K. (2013). Audio steganography used for secure data transmission. In Proceedings of international conference on advances in computing, Springer, New Delhi, pp. 699–706.

  26. Matsuoka, H. (2006). Spread spectrum audio steganography using sub-band phase shifting. In 2006 International Conference on Intelligent Information Hiding and Multimedia, pp. 3–6. IEEE.

  27. Jayaram, P., Ranganatha, H. R., & Anupama, H. S. (2011). Information hiding using audio steganography–a survey. The International Journal of Multimedia and Its Applications (IJMA), 3, 86–96.

    Article  Google Scholar 

  28. Mittal, A., Moorthy, A. K., & Bovik, A. C. (2012). No-reference image quality assessment in the spatial domain. IEEE Transactions on image processing, 21(12), 4695–4708.

    Article  MathSciNet  MATH  Google Scholar 

  29. Ghobadi, A., Boroujerdizadeh, A., Yaribakht, A. H., & Karimi, R. (2013). Blind audio watermarking for tamper detection based on LSB. In 2013 15th international conference on advanced communications technology (ICACT), IEEE, pp. 1077–1082.

  30. Bhattacharyya, S., & Sanyal, G. (2012). Audio steganalysis of LSB audio using moments and multiple regression model. International Journal of Advances in Engineering and Technology, 3(1), 145.

    Google Scholar 

  31. Zhao, Z., Liu, F., Luo, X., Xie, X., & Yu, L. (2012). LSB replacement steganography software detection based on model checking. In International workshop on digital watermarking Springer, Berlin, Heidelberg, pp. 54–68.

  32. Sabeti, V., Samavi, S., Mahdavi, M., & Shirani, S. (2007). Steganalysis of pixel-value differencing steganographic method. In 2007 IEEE pacific rim conference on communications, computers and signal processing, IEEE, 292–295.

  33. Gutub, A. A. A. (2010). Pixel indicator technique for RGB image steganography. Journal of emerging technologies in web intelligence, 2(1), 56–64.

    Article  Google Scholar 

  34. Gutub, A., Ankeer, M., Abu-Ghalioun, M., Shaheen, A., & Alvi, A. (2008). Pixel indicator high capacity technique for RGB image based Steganography.

  35. Chang, C. L., & Girod, B. (2007). Direction-adaptive discrete wavelet transform for image compression. IEEE Transactions on Image Processing, 16(5), 1289–1302.

    Article  MathSciNet  Google Scholar 

  36. Ghazali, K. H., Mansor, M. F., Mustafa, M. M., & Hussain, A. (2007). Feature extraction technique using discrete wavelet transform for image classification. In 2007 5th Student Conference on Research and Development, IEEE, pp. 1–4.

  37. Lidong, H., Wei, Z., Jun, W., & Zebin, S. (2015). Combination of contrast limited adaptive histogram equalization and discrete wavelet transform for image enhancement. IET Image Processing, 9(10), 908–915.

    Article  Google Scholar 

  38. Naidu, V. P. S. (2012). Discrete cosine transform based image fusion techniques. Journal of Communication, Navigation and Signal Processing, 1(1), 35–45.

    Google Scholar 

  39. Elharar, E., Stern, A., Hadar, O., & Javidi, B. (2007). A hybrid compression method for integral images using discrete wavelet transform and discrete cosine transform. Journal of display technology, 3(3), 321–325.

    Article  Google Scholar 

  40. Zeng, B., & Fu, J. (2008). Directional discrete cosine transforms—A new framework for image coding. IEEE transactions on circuits and systems for video technology, 18(3), 305–313.

    Article  Google Scholar 

  41. Alhayani, B. S., Hamid, N., Almukhtar, F. H., Alkawak, O. A., Mahajan, H. B., Kwekha-Rashid, A. S., & Alkhayyat, A. (2022). Optimized video Internet of things using elliptic curve cryptography based encryption and decryption. Computers and Electrical Engineering, 101, 108022.

    Article  Google Scholar 

  42. Huang, Y., Lei, Z., Song, Z., Guo, Y., & Li, Y. (2021). A Video Steganography Scheme Based on Post-Quantum Cryptography. In 2021 IEEE international conference on information communication and software engineering (ICICSE), IEEE, pp. 83–87.

  43. El-Shafai, W., Almomani, I. M., & Alkhayer, A. (2021). Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication. IEEE Access, 9, 35004–35026.

    Article  Google Scholar 

  44. Zhao, H., Liu, Y., Wang, Y., Liu, S., & Feng, C. (2021). A video steganography method based on transform block decision for H. 265/HEVC. IEEE Access, 9, 55506–55521.

    Article  Google Scholar 

  45. Chen, Y., Wang, H., Choo, K. K. R., He, P., Salcic, Z., Kaafar, M. A., & Zhang, X. (2021). DDCA: A distortion drift-based cost assignment method for adaptive video steganography in the transform domain. IEEE transactions on dependable and secure computing.

  46. Suresh, M., & Sam, I. S. (2021). Exponential fractional cat swarm optimization for video steganography. Multimedia Tools and Applications, 80(9), 13253–13270.

    Article  Google Scholar 

  47. Keerthi, K., & Surendiran, B. (2017). Elliptic curve cryptography for secured text encryption. In 2017 International conference on circuit, power and computing technologies (ICCPCT), IEEE, pp. 1–5.

  48. Chauhan, S., Kumar, J., & Doegar, A. (2017). Multiple layer text security using variable block size cryptography and image steganography. In 2017 3rd international conference on computational intelligence and communication technology (CICT), IEEE, 1–7.

  49. Alkhudaydi, M., & Gutub, A. (2021). Securing data via cryptography and arabic text steganography. SN Computer Science, 2(1), 1–18.

    Article  Google Scholar 

  50. Al-Nofaie, S., Gutub, A., & Al-Ghamdi, M. (2021). Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. Journal of King Saud University-Computer and Information Sciences, 33(8), 963–974.

    Article  Google Scholar 

  51. Ahvanooey, M. T., Li, Q., Hou, J., Mazraeh, H. D., & Zhang, J. (2018). AITSteg: An innovative text steganography technique for hidden transmission of text message via social media. IEEE Access, 6, 65981–65995.

    Article  Google Scholar 

  52. Malik, A., Sikka, G., & Verma, H. K. (2017). A high capacity text steganography scheme based on LZW compression and color coding. Engineering Science and Technology, An International Journal, 20(1), 72–79.

    Article  Google Scholar 

  53. Sinha, N., Bhowmick, A., & Kishore, B. (2015). Encrypted information hiding using audio steganography and audio cryptography. International Journal of Computer Applications112(5).

  54. Socek, D., & Magliveras, S. S. (2005). General access structures in audio cryptography. In 2005 IEEE international conference on electro information technology IEEE, p. 6.

  55. Lee, M. C., & Lau, C. Y. (2018). Three orders mixture algorithm of audio steganography combining cryptography. Journal of Information Hiding and Multimedia Signal Processing, 9(4), 959–969.

    Google Scholar 

  56. Alhassan, S. (2021). Audio cryptography via enhanced genetic algorithm. The International Journal of Multimedia and Its Applications (IJMA), 13.

  57. Ali, A. H., George, L. E., Zaidan, A. A., & Mokhtar, M. R. (2018). High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimedia Tools and Applications, 77(23), 31487–31516.

    Article  Google Scholar 

  58. Elkandoz, M. T., & Alexan, W. (2019). Logistic tan map based audio steganography. In 2019 international conference on electrical and computing technologies and applications (ICECTA), IEEE, pp. 1–5.

  59. Hemeida, F., Alexan, W., & Mamdouh, S. (2019). Blowfish–secured audio steganography. In 2019 novel intelligent and leading emerging sciences conference (NILES), IEEE, vol. 1, pp. 17–20.

  60. Tayel, M., Gamal, A., & Shawky, H. (2016). A proposed implementation method of an audio steganography technique. In 2016 18th international conference on advanced communication technology (ICACT), IEEE, pp. 180–184.

  61. Kar, D. C., & Mulkey, C. J. (2015). A multi-threshold based audio steganography scheme. Journal of information security and applications, 23, 54–67.

    Article  Google Scholar 

  62. Al-Rahal, M. S., Abi Sen, A., & Basuhil, A. A. (2016). High level security based steganoraphy in image and audio files. Journal of theoretical and Applied Information Technology, 87(1), 29.

    Google Scholar 

  63. Naskar, P. K., & Chaudhuri, A. (2014). A secure symmetric image encryption based on bit-wise operation. International Journal of Image, Graphics and Signal Processing, 6(2), 30.

    Article  Google Scholar 

  64. Kalubandi, V. K. P., Vaddi, H., Ramineni, V., & Loganathan, A. (2016). A novel image encryption algorithm using AES and visual cryptography. In 2016 2Nd international conference on next generation computing technologies (NGCT), IEEE, pp. 808–813.

  65. Ferdush, J., Begum, M., & Mahmood, A. (2017). A new image encryption technique combining the idea of one time pad with RGB value. International Journal of Computer Applications, 178(5), 12–15.

    Article  Google Scholar 

  66. Wang, X., Feng, L., & Zhao, H. (2019). Fast image encryption algorithm based on parallel computing system. Information Sciences, 486, 340–358.

    Article  MATH  Google Scholar 

  67. Li, C., Lin, D., Lü, J., & Hao, F. (2018). Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimedia, 25(4), 46–56. https://doi.org/10.1109/MMUL.2018.2873472

    Article  Google Scholar 

  68. Qazanfari, K., & Safabakhsh, R. (2014). A new steganography method which preserves histogram: Generalization of LSB++. Information Sciences, 277, 90–101.

    Article  MathSciNet  Google Scholar 

  69. Yuan, H. D. (2014). Secret sharing with multi-cover adaptive steganography. Information Sciences, 254, 197–212.

    Article  MathSciNet  MATH  Google Scholar 

  70. Muhammad, K., Ahmad, J., Rehman, N. U., Jan, Z., & Sajjad, M. (2017). CISSKA-LSB: Color image steganography using stego key-directed adaptive LSB substitution method. Multimedia Tools and Applications, 76(6), 8597–8626.

    Article  Google Scholar 

  71. Tavares, R., & Madeiro, F. (2016). Word-Hunt: A LSB steganography method with low expected number of modifications per pixel. IEEE Latin America Transactions, 14(2), 1058–1064.

    Article  Google Scholar 

  72. Nguyen, T. D., Arch-Int, S., & Arch-Int, N. (2016). An adaptive multi bit-plane image steganography using block data-hiding. Multimedia tools and applications, 75(14), 8319–8345.

    Article  Google Scholar 

Download references

Funding

No funding is provided for the preparation of manuscript.

Author information

Authors and Affiliations

Authors

Contributions

All authors have equal contributions in this work.

Corresponding author

Correspondence to Fredy Varghese.

Ethics declarations

Conflict of interest

Authors Fredy Varghese, P. Sasikala declares that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Consent to Participate

All the authors involved have agreed to participate in this submitted article.

Consent to Publish

All the authors involved in this manuscript give full consent for publication of this submitted article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Varghese, F., Sasikala, P. A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography. Wireless Pers Commun 129, 2291–2318 (2023). https://doi.org/10.1007/s11277-023-10183-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10183-z

Keywords

Navigation