Published In

Volume 2 Issue 5


Paper Id



Page Number




  1. Rudra J. Vivarekar
  2. Nikita J. Kolhe
  3. Darshana A. Mundada
  4. Yogita G. Motiramani


Share This Article

Paper Details


Network Security using StegoCrypt


Information security plays a vital role in communication. The threats to information security have been incrementing at confounding rate. The most influential approaches used against such threats are cryptography and steganography. Cryptography and Steganography are two most popular ways to secure data transmission. However, combination of these two techniques results in appearing a highly secured method for data communication. In the proposed system for cryptography, the algorithm of substitution is based on Play Color Cipher and asymmetric RSA algorithm is used to make Play Color Cipher key in encrypted form. In steganography, encrypted key is hidden using multimedia steganography technique.

Key Words

Click here for Article Preview


. . .


Rudra J. Vivarekar, Nikita J. Kolhe, Darshana A. Mundada, Yogita G. Motiramani, "Network Security using StegoCrypt", IJIRCT, Volume 2, Issue 5, Pages 187-189, April-2017,

Download Paper


Print This Page


Download Counter