A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages

被引:0
|
作者
Rasras, Rashad J. [1 ]
AlQadi, Ziad A. [1 ]
Abu Sara, Mutaz Rasmi [2 ]
机构
[1] Al Balqa Appl Univ, Dept Comp Engn, Amman, Jordan
[2] Taibah Univ, Dept Comp Sci, Al Medina, Saudi Arabia
关键词
steganography; decryption time; MSE; cryptography; encryption time; speedup; PSNR;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Steganography and cryptography are very important techniques used in data security to hide and secure secret messages in transmitted data. This paper will introduce, implement and test a novel methodology which can be used as a secure and highly efficient method of data hiding and data extracting. Some efficiency parameters will be experimentally obtained and compared with other existing methods parameters to prove the efficiency of the proposed methodology.
引用
收藏
页码:3681 / 3684
页数:4
相关论文
共 50 条
  • [1] Puzzle based Highly Secure Steganography
    Shankar, Siva S.
    Rengarajan, A.
    [J]. 2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [2] Robust and Secure Image Steganography Based on Elliptic Curve Cryptography
    Ahmed, Diaa E. M.
    Khalifa, Othman O.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2014, : 288 - 291
  • [3] A Highly Secure DNA Based Image Steganography
    Das, Prasenjit
    Kar, Nirmalya
    [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [4] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Varghese, Fredy
    Sasikala, P.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (04) : 2291 - 2318
  • [5] A Secure Text Communication Scheme Based on Combination of Compression, Cryptography, and Steganography
    Saneja, Kirti
    Kumar, Mukesh
    Sharma, Pallavi
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 205 - 214
  • [6] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Fredy Varghese
    P. Sasikala
    [J]. Wireless Personal Communications, 2023, 129 : 2291 - 2318
  • [7] Highly Secure DNA-based Audio Steganography
    Shyamasree, C. M.
    Anees, Sheena
    [J]. 2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 519 - 524
  • [8] Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography
    Zhang, Xin
    Chen, Kejiang
    Ding, Jinyang
    Yang, Yuqi
    Zhang, Weiming
    Yu, Nenghai
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3148 - 3163
  • [9] A Secure Data Hiding Scheme Based on Combined Steganography and Visual Cryptography Methods
    Nandakumar, Aishwarya
    Harmya, P.
    Jagadeesh, Noopa
    Anju, S. S.
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 498 - 505
  • [10] A Novel Secure Communication Protocol Combining Steganography and Cryptography
    Song, Shouchao
    Zhang, Jie
    Liao, Xin
    Du, Jiao
    Wen, Qiaoyan
    [J]. CEIS 2011, 2011, 15