Published in:

Volume 2 Issue 5
eISSN: 2454-5988


Unique Identifier




Page Number




Share This Article



Paper Details


Network Security using StegoCrypt


Information security plays a vital role in communication. The threats to information security have been incrementing at confounding rate. The most influential approaches used against such threats are cryptography and steganography. Cryptography and Steganography are two most popular ways to secure data transmission. However, combination of these two techniques results in appearing a highly secured method for data communication. In the proposed system for cryptography, the algorithm of substitution is based on Play Color Cipher and asymmetric RSA algorithm is used to make Play Color Cipher key in encrypted form. In steganography, encrypted key is hidden using multimedia steganography technique.

Key Words


Click here for Article Preview

It appears you don't have Adobe Reader or PDF support in this web browser. Click here for view PDF

Download Paper


Print This Page


Download Citations


Download Counter