A REVIEW ON USE OF STEGANOGRAPHY FOR CYBER CRIME PREVENTION

Authors

  • Shivneet Singh

Keywords:

Cyber crime,, Steganography, Cryptography,

Abstract

The many forms of cybercrime are categorized here. Internet-based criminal activity, or "cyber crime," is distinct from traditional crime. This kind of crime encompasses a wide range of illegal conduct. The term "cyber crime" has been used to describe a broad category of illegal activity. Several unethical pursuits are carried out under this guise. The anonymity of the Internet has led to some terrible acts being committed in cyberspace recently. Many online users are abusing this service in egregious ways. While the internet has many beneficial applications, it may also be used for illegal purposes. In addition, this study summarizes various previous studies on the topic of cybercrime. Steganography and other forms of cryptography are employed to combat online criminal activity.

References

Abhishek Kumar Bharti, ”Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptography”IOSR Journal of Computer Engineering (IOSRJCE)e-ISSN: 2278-0661, p-ISSN: 2278-8727 volume 13, Issue 2 (Jul. -Aug. 2013), PP 66-73

Hani Alshamrani, “Internet Protocol Security (IPSec) Mechanisms”, International Journal of Scientific & Engineering Research, Volume 5, Issue 5, May-2014, pp. 85-87.

ChanderDiwakar, Sandeep Kumar, Amit Chaudhary, “SECURITY THREATS IN PEER TO PEER NETWORKS”, Journal of Global Research in Computer Science, Volume 2, No. 4, April 2011, pp. 81-84.

HaroonShakiratOluwatosin, “ClientServer Model”, Journal of Computer Engieering (IOSR-JCE), Volume 16, Issue 1, Feb. 2014, pp. 67-71.

Ms. Jasmin Bhambure, Ms. DhanashriChavan, Ms. Pallavi Band, Mrs.LakshmiMadhuri, “Secure Authentication Protocol in Client – Server Application using Visual Cryptography”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 2, February 2014, pp. 556-560.

Mohan V. Pawar, Anuradha J, Security of network and Types of Attacks in Network”, International Conference on

Intelligent Computing, Communication & Convergence, 2015, pp. 503 – 506.

MANJIRI N. MULEY, “ANALYSIS FOR EXPLORING THE SCOPE OF NETWORK SECURITY TECHNIQUES IN DIFFERENT ERA: A STUDY”, International Journal of Advanced Computational Engineering and Networking, Volume-3, Issue-12, Dec.-2015, pp. 33-36.

Rupam, AtulVerma, Ankita Singh, “An Approach to Detect Packets Using Packet Sniffing, International Journal of Computer Science & Engineering Survey (IJCSES) ,Vol.4, No.3, June 2013, pp.21-33.

Downloads

Published

31-03-2021

How to Cite

Singh, S. (2021). A REVIEW ON USE OF STEGANOGRAPHY FOR CYBER CRIME PREVENTION . International Journal for Research Publication and Seminar, 12(1), 158–164. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/109

Issue

Section

Original Research Article