{"title":"变形密码学研究进展:密码学与隐写技术的结合","authors":"Ritima Tripathi, L. S. Umrao, Abhinandan Tripathi","doi":"10.1109/icacfct53978.2021.9837385","DOIUrl":null,"url":null,"abstract":"In the current modern era the transmission of any confidential information over any communication network is an important concern. We can secure any message using the concept of cryptography or embedding the private message into any multimedia file like text, audio, image & video. If we use both concepts separately then it is not more effective in the context of security. So, the combination of both concepts means combination of cryptography and steganography provides more security to the confidential message. In this review paper we analyse the several combinations of cryptographic and steganographic algorithms over different multimedia messages.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Review on Metamorphic Cryptography: A Combined Approach of Cryptography & Steganography Techniques\",\"authors\":\"Ritima Tripathi, L. S. Umrao, Abhinandan Tripathi\",\"doi\":\"10.1109/icacfct53978.2021.9837385\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the current modern era the transmission of any confidential information over any communication network is an important concern. We can secure any message using the concept of cryptography or embedding the private message into any multimedia file like text, audio, image & video. If we use both concepts separately then it is not more effective in the context of security. So, the combination of both concepts means combination of cryptography and steganography provides more security to the confidential message. In this review paper we analyse the several combinations of cryptographic and steganographic algorithms over different multimedia messages.\",\"PeriodicalId\":312952,\"journal\":{\"name\":\"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)\",\"volume\":\"156 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/icacfct53978.2021.9837385\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icacfct53978.2021.9837385","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Review on Metamorphic Cryptography: A Combined Approach of Cryptography & Steganography Techniques
In the current modern era the transmission of any confidential information over any communication network is an important concern. We can secure any message using the concept of cryptography or embedding the private message into any multimedia file like text, audio, image & video. If we use both concepts separately then it is not more effective in the context of security. So, the combination of both concepts means combination of cryptography and steganography provides more security to the confidential message. In this review paper we analyse the several combinations of cryptographic and steganographic algorithms over different multimedia messages.