A literature Review of Cryptography on RC4 Stream Cipher and Hash-LSB Steganography
In the modern world with the emergence of technology, the entire network includes the digital data that adds new dimensions as to how data can be exchanged effectively and safely in real time from one part of the world to another. Such new opportunities are followed by obstacles such as keeping information confidential and secret or data that is a lively area to explore. It is necessary to transform the information into cryptic form to safely transfer the information from intruders, so that the information is concealed from the intruders. Researchers have always found it fascinating to establish safe techniques that would allow the data to reach from the sender without exposing it to third parties. Therefore several techniques have been developed to transfer data securely and steganography is one of them. In this paper, we review numerous research papers on different techniques of encryption and steganography. This paper contains details about the RC4 encryption algorithm, and how steganography and encryption methods are used. The cryptography and steganography techniques ensure the security of the data.