{"title":"Advantages and disadvantages of using cryptography in steganography","authors":"A. Hadipour, Raheleh Afifi","doi":"10.1109/ISCISC51277.2020.9261921","DOIUrl":null,"url":null,"abstract":"The use of cryptographic algorithms varies based on the type of application. Also have different uses for steganography algorithms based on media type, format and capacity. Therefore, the combination of these two technologies has definitely had a special sensitivity that must be properly examined. The use of cryptographic algorithms in steganographic systems increases the security of hidden data. But this security should not make the entropy more visible. In this paper presents two steganography algorithms, so that one cryptographic algorithm will be used to encrypt the message before the steganography operation. In the following, the advantages of using and not using these cryptographic algorithms against its disadvantages are reviewed and suggestions about their use in steganography algorithms and systems are presented.","PeriodicalId":206256,"journal":{"name":"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 17th International ISC Conference on Information Security and Cryptology (ISCISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCISC51277.2020.9261921","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The use of cryptographic algorithms varies based on the type of application. Also have different uses for steganography algorithms based on media type, format and capacity. Therefore, the combination of these two technologies has definitely had a special sensitivity that must be properly examined. The use of cryptographic algorithms in steganographic systems increases the security of hidden data. But this security should not make the entropy more visible. In this paper presents two steganography algorithms, so that one cryptographic algorithm will be used to encrypt the message before the steganography operation. In the following, the advantages of using and not using these cryptographic algorithms against its disadvantages are reviewed and suggestions about their use in steganography algorithms and systems are presented.