Performance Analysis and Implementation of DES Algorithm and RSA Algorithm with Image and Audio Steganography Techniques

  • Ankit Gambhir
  • Khushboo
  • Rajeev AryaEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 810)


In today’s era, data security is an important concern. It is most demanding issue nowadays. It is essential for people using online banking, e-shopping, reservations, etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data, so that the intruder will not be able to retrieve it; however, steganography covers that data in some cover file, so that the presence of communication is hidden. There are some techniques that integrate cryptography and steganography to provide multi-layer security. This paper shows the comparison of such two techniques. These are “RSA cryptography with image steganography and with audio steganography” and “DES cryptography with image steganography and with audio steganography”. Stimulated results have been presented using MATLAB software.


Cryptography Steganography Data security Intruder RSA DES Image steganography Audio steganography 


  1. 1.
    Gambhir, A., Khara, S.: Integrating RSA cryptography & audio steganography. In: IEEE, ICCCA 2016, pp. 481–483. IEEE, India (2016).
  2. 2.
    Joseph, R., Sundaram, V.: Cryptography and steganography-a survey. IJCTA 2(3), 626–630 (2011)Google Scholar
  3. 3.
    Krenn, R.: Steganography and steganalysis, an article, Santa Barbara, CA. (2004).
  4. 4.
    Pye Pye, A., Min Tun, N.: A novel secure combination technique of steganography and cryptography. IJITMC 2(1), 55–62 (2014)CrossRefGoogle Scholar
  5. 5.
    Gambhir, A., Mishra, A.: CRYPTICSTEGANOGRAPHY: a new data hiding technique with multilayer security system. IJIACS 4(1), 134–136 (2015)Google Scholar
  6. 6.
    Usha, S., Satish, K., Boopathybagan, K.: A secure triple level encryption method using cryptography and steganography. In: IEEE Computing Communication and Networking Technologies (ICCCNT), 1017–1020 (2011)Google Scholar
  7. 7.
    Gambhir, A.: RSA algorithm or DES algorithm? (a comparative analysis). JECAS 3(4), 27–29 (2014)Google Scholar
  8. 8.
    Anuradha, H.K.: Enhanced LSB technique for audio steganography In: IEEE Computing Communication and Networking Technologies, India, pp. 89–95 (2012)Google Scholar
  9. 9.
    Arfan, S., Kirankumar, S., Vishal, U., Neeraj, V.: Audio steganography and security using cryptography. IJETAE India 4(2), 317–319 (2014)Google Scholar
  10. 10.
    Piyush, M., Paresh, M.: Visual cryptographic steganography in images In: IEEE Computing Communication and Networking Technologies (ICCCNT), pp. 1–6 (2010)Google Scholar
  11. 11.
    Manoj, K., Amit, U., Shalini, A.: Adaptive steganographic algorithm using cryptographic encryption RSA algorithms. JEC&AS 2(1), 1–3 (2013)Google Scholar
  12. 12.
    Deshpande, P., Sharma, S.C., Peddoju, S.K., et al.: Security and service assurance issues in Cloud environment. Int. J. Syst. Assur. Eng. Manag. (2016). Scholar
  13. 13.
    Deshpande, P., Sharma, S.C., Peddoju, S.K.: Data storage security in cloud paradigm. In: Proceedings of Fifth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol. 436. Springer, Singapore (2016)Google Scholar
  14. 14.
    Deshpande, P., Sharma, S.C., Peddoju, S.K., Abraham, A.: Efficient multimedia data storage in cloud environment. Informatica Ljubljana 39(4), 431–442 (2015)Google Scholar
  15. 15.
    Deshpande, P., Sharma, S.C., Kumar, P.S.: Security threats in cloud computing. In: International Conference on Computing, Communication & Automation (ICCCA), pp. 632–636 (2015)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Delhi Technical CampusNoidaIndia
  2. 2.Northern India Engineering CollegeNew DelhiIndia
  3. 3.National Institute of TechnologyPatnaIndia

Personalised recommendations