An Insight of Information Security: A Skeleton
Yash Shah1, Soham Joshi2, Parita Oza3, Smita Agrawal4

1Yash Shah*, Information Technology, Institute of Technology, Nirma University, Ahmedabad, India.
2Soham Joshi, Information Technology, Institute of Technology, Nirma University, Ahmedabad, India.
3Prof. Parita Oza, Information Technology, Institute of Technology, Nirma University, Ahmedabad, India.
4Prof. Smita Agrawal, CSE Department, Institute of Technology, Nirma University, Ahmedabad, India.

Manuscript received on 2 August 2019. | Revised Manuscript received on 11 August 2019. | Manuscript published on 30 September 2019. | PP: 2600-2605 | Volume-8 Issue-3 September 2019 | Retrieval Number: C4922098319/2019©BEIESP | DOI: 10.35940/ijrte.C4922.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: In this age of growing and developing information and technology, data security, integrity and confidentiality are essential aspects related to shared data over some network or medium. Many techniques over the years have been developed for securing the messages from attack or theft or breach of very sensible and essential data when shared over a network. The security threats to data have been ascending, so are the data hiding or securing techniques. This is where Information Security has a role to play. Development of techniques and methods that prevents the essential and secret data being stolen and thus providing security to the data. This paper discusses the significance of Information Security, its evolution since its infant stage and study about various subdomains of the same. This paper also shows a comparative study of various Information Security Techniques, their pros and cons and the applications in various domains. This paper analyses various Information Security methods or techniques based on their various characteristics and effectiveness on securing the data from any adversaries. This includes a study of some benchmark techniques and their subsidiaries along with it. The techniques under focus for analyzing were Watermarking, Digital Signatures, Fingerprinting, Cryptography, Steganography and latest being CryptoSteganography Information Security Technique. The characteristics focused were security-related properties, data or message-related properties, their objectives, drawbacks, applications and algorithms.
Index Terms: Information Security, Cryptography, Steganography, CryptoSteganography.

Scope of the Article:
Information Retrieval