Literature Review on Steganography and Cryptography Integrated file sharing system
Sandra KV
Department of Computer Science and Engineering
(Cyber Security ) Vimal Jyothi Engineering
College Chemperi, Kannur
Sandra.k.v1234@gmail.com
Adith PV
Harshith TV Department of Computer Science and Engineering (Cyber Security )
Vimal Jyothi Engineering College
Chemperi, Kannur hharshithtv@gmail.com
Aswin P
Department of Computer Science and Engineering
(Cyber Security ) Vimal Jyothi Engineering
College Chemperi, Kannur
aswinnarayanan004@gmail.com
Anu Treesa George
Department of Computer Science and Engineering (Cyber Security )
Vimal Jyothi Engineering College Chemperi, Kannur adithpv75@gmail.com
Assistant Professor Department of Computer Science and
Engineering (Cyber Security ) Vimal Jyothi Engineering College Chemperi, Kannur anuvellackallil@vjec.ac.in
Abstract—The increasing rise of digital communica- tion necessitates innovative techniques to safeguarding sensitive data from sophisticated cyberthreats. This study offers a solid basis for secure data transport by fusing the most recent advancements in steganographic and crypto- graphic approaches. Significant improvements in dura- bility, data capacity, and imperceptibility are provided by techniques including wavelet transformations, DNA- based mechanisms, modulus-based embedding, and edge detection. While advanced steganographic techniques like Pixel Value Differencing (PVD), histogram shifting, and discrete wavelet transformations facilitate data con- cealing, cryptographic techniques like AES and DNA cryptography are examples of approaches that improve encryption. Integrating these strategies ensures end-to- end security and scalability in sectors like government communication, healthcare, finance, and the Internet of Things. Steganography and cryptography together hold considerable promise for improving data security, even in the face of challenges like steganalysis vulnerability and computational complexity. Future research should focus on computing efficiency, adaptive algorithms, and quantum-resilient cryptographic systems in order to address emerging risks and expand application in in- creasingly interconnected digital ecosystems.
index terms - Image Steganography , Cryptography , Secure File Sharing , ECDH.PVD,Digital Security Secure Communication