
International Journal on Science and Technology
E-ISSN: 2229-7677
•
Impact Factor: 9.88
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 16 Issue 2
2025
Indexing Partners



















Enhancing data security using hybrid techniques
Author(s) | Prakash.S, Rakesh Raju.J, Govindhavasan.M, Ramanujam.K.S, Jayaprakash.S, CHINCHU NAIR.S |
---|---|
Country | India |
Abstract | Steganography and Cryptography are two vital techniques to secure communication in the digital age. Steganography conceals the very existence of information, while Cryptography encrypts the content, making it unreadable without the correct key. By combining these two methods, a highly secure system for transmitting sensitive data can be developed. This paper provides a detailed survey of the most prominent steganographic and cryptographic techniques, focusing on reversible data-hiding methods, image-based steganography, and the challenges these techniques face in maintaining security and robustness. We explore various applications, including cloud security and digital forensics, while addressing future research directions to enhance secure communication. |
Keywords | Steganography, Cryptography, Data Hiding, Encryption, Decryption |
Field | Computer > Data / Information |
Published In | Volume 16, Issue 2, April-June 2025 |
Published On | 2025-04-13 |
Cite This | Enhancing data security using hybrid techniques - Prakash.S, Rakesh Raju.J, Govindhavasan.M, Ramanujam.K.S, Jayaprakash.S, CHINCHU NAIR.S - IJSAT Volume 16, Issue 2, April-June 2025. DOI 10.71097/IJSAT.v16.i2.3542 |
DOI | https://doi.org/10.71097/IJSAT.v16.i2.3542 |
Short DOI | https://doi.org/g9fcfs |
Share this


CrossRef DOI is assigned to each research paper published in our journal.
IJSAT DOI prefix is
10.71097/IJSAT
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
