World without Internet is very difficult to recognize. Increasing dependency and popularity of Internet among its users make its user life easier and fast. Some of the information of its users can be public without taking much pain but, on the other hand side, some information cannot be made public. It needs not only privacy but security too. Security at the cost of asset. How much security is enough in terms of cost of asset? Several researcher advocates use cryptography to provide required security to sensitive information. Some popular algorithms which perform cryptography are RSA with AVK, ECC, Hybrid, CE, Blowfish, Twofish, Threefish, etc. Some researchers advocate the use of steganography. Some popular algorithms are LSB, modified LSB, etc. Some researchers advocate the use of both approach, i.e., cryptography and steganography. This approach is popularly known as metamorphic cryptography. Cryptography helps when caught by some unauthorized user and steganography helps in creating less suspect. In this paper, a survey is carried out over popular techniques used by researcher in performing cryptography and steganography. Paper tried to discuss the methodology these algorithms use. Paper also tries to discuss the strength and limitation of various proposed algorithm according to respective authors claims in their research work.
CITATION STYLE
Joshi, R., Trivedi, M. C., Gupta, A. K., & Tripathi, P. (2021). Current trends in cryptography, steganography, and metamorphic cryptography: A survey. In Advances in Intelligent Systems and Computing (Vol. 1086, pp. 237–247). Springer. https://doi.org/10.1007/978-981-15-1275-9_20
Mendeley helps you to discover research relevant for your work.