In these days communication technology is very advanced. Digital communication has become very important to secure transmission of information between the sender and the receiver. Security for exchange is a very important feature because it protects information from interloper. In this paper we present a hierarchy of network security technologies such as privacy, authentication, non-rejection and honesty control. There are two popular security mechanisms, namely cryptography and steganography. Both are well known and widely used techniques. Cryptography is used to send data in an encrypted form using the encryption key. Encrypted data is transmitted through unsafe public media. Decryption algorithms are also used to decrypt messages when using decryption keys. Steganography is used to hide data in other cover media.
[1]
Nehal G. Chitaliya,et al.
Secured and Robust Dual ImageSteganography: A Survey
,
2015
.
[2]
Fatma A. Omara,et al.
Data Security Using Cryptography and Steganography Techniques
,
2016
.
[3]
Sandeep Kaur,et al.
Review on Network Security and Cryptography
,
2017
.
[4]
Md. Khalid Imam Rahmani,et al.
A Crypto-Steganography: A Survey
,
2014
.
[5]
Vishnu S Babu,et al.
A Study on Combined Cryptography and Steganography
,
2015
.
[6]
Aarti Mehndiratta.
Data Hiding System Using Cryptography & Steganography: A Comprehensive Modern Investigation
,
2015
.
[7]
Shyam Nandan Kumar,et al.
Review on Network Security and Cryptography
,
2015
.