Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis

Indy Haverkamp, Dipti K. Sarmah*

*Corresponding author for this work

Research output: Contribution to journalArticleAcademicpeer-review

3 Citations (Scopus)
72 Downloads (Pure)

Abstract

In today's interconnected world, safeguarding digital data's confidentiality and security is crucial. Cryptography and steganography are two primary methods used for information security. While these methods have diverse applications, there is ongoing exploration into the potential benefits of merging them. This review focuses on journal articles from 2010 onwards and conference papers from 2018 onwards that integrate steganography and cryptography in practical applications. The results are gathered through different databases like Scopus, IEEE, and Web of Science. Our approach involves gaining insights into real-world applications explored in the existing literature and categorizing them based on domains and technological areas. Furthermore, we comprehensively analyze the advantages and limitations associated with these implementations, examining them from three evaluation perspectives: security, performance, and user experience. This categorization offers guidance for future research in unexplored areas, while the evaluation perspectives provide essential considerations for analyzing real-world implementations.
Original languageEnglish
Pages (from-to)2607-2635
Number of pages29
JournalInternational journal of information security
Volume23
Early online date5 May 2024
DOIs
Publication statusPublished - Aug 2024

Keywords

  • UT-Hybrid-D
  • Cryptography
  • Real-world application
  • Evaluation perspectives
  • Security
  • Image steganography

Fingerprint

Dive into the research topics of 'Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis'. Together they form a unique fingerprint.

Cite this