A literature Review of Cryptography on RC4 Stream Cipher and Hash-LSB Steganography

2020 International journal for research in engineering application & management  
In the modern world with the emergence of technology, the entire network includes the digital data that adds new dimensions as to how data can be exchanged effectively and safely in real time from one part of the world to another. Such new opportunities are followed by obstacles such as keeping information confidential and secret or data that is a lively area to explore. It is necessary to transform the information into cryptic form to safely transfer the information from intruders, so that the
more » ... information is concealed from the intruders. Researchers have always found it fascinating to establish safe techniques that would allow the data to reach from the sender without exposing it to third parties. Therefore several techniques have been developed to transfer data securely and steganography is one of them. In this paper, we review numerous research papers on different techniques of encryption and steganography. This paper contains details about the RC4 encryption algorithm, and how steganography and encryption methods are used. The cryptography and steganography techniques ensure the security of the data.
doi:10.35291/2454-9150.2020.0308 fatcat:4nobg2y2sfcrfduvb7qw7oisoy