A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages

被引:0
|
作者
Rasras, Rashad J. [1 ]
AlQadi, Ziad A. [1 ]
Abu Sara, Mutaz Rasmi [2 ]
机构
[1] Al Balqa Appl Univ, Dept Comp Engn, Amman, Jordan
[2] Taibah Univ, Dept Comp Sci, Al Medina, Saudi Arabia
关键词
steganography; decryption time; MSE; cryptography; encryption time; speedup; PSNR;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Steganography and cryptography are very important techniques used in data security to hide and secure secret messages in transmitted data. This paper will introduce, implement and test a novel methodology which can be used as a secure and highly efficient method of data hiding and data extracting. Some efficiency parameters will be experimentally obtained and compared with other existing methods parameters to prove the efficiency of the proposed methodology.
引用
收藏
页码:3681 / 3684
页数:4
相关论文
共 50 条
  • [31] Steganography-Based Secure Communication
    Bhatia, Manjot
    Muttoo, Sunil Kumar
    Bhatia, M. P. S.
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2012), 2014, 236 : 781 - 792
  • [32] Secure steganography based on embedding capacity
    Sajedi, Hedieh
    Jamzad, Mansour
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (06) : 433 - 445
  • [33] SEBS - Secure Emoticons Based Steganography
    Rafat, Khan Farhan
    Hussain, Junaid
    [J]. PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 280 - 287
  • [34] Secure non real time image encryption algorithm development using cryptography & Steganography
    Mukhedkar, Moresh
    Powar, Prajkta
    Gaikwad, Peter
    [J]. 2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [35] The Application Of LSB Steganography For Secure Text and Hiding Confidential Information Using AES Cryptography
    Ahyuna, Ahyuna
    Syamsuddin, Sadly
    Hasriani, Hasriani
    Ardimansyah, Ardimansyah
    Irmawati, Irmawati
    Wahyuni, Sri
    [J]. 3RD INTERNATIONAL CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS (ICORIS 2021), 2021, : 356 - 362
  • [36] Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography
    Hussain, Mehdi
    Wahab, Ainuddin Wahid Abdul
    Batool, Ishrat
    Arif, Muhammad
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (02): : 179 - 188
  • [37] A Secure Trigonometry based Cryptography Algorithm
    Gowda, Shreyank N.
    Vrishabh, D. N.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 106 - 109
  • [38] New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography
    Su, Pin-Chang
    Tsai, Chien-Hua
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (11): : 5537 - 5555
  • [39] Secure two fold transmission of features using multimodal mask steganography and naive based random visual cryptography system
    S. Jahnavi
    C. Nandini
    [J]. International Journal of System Assurance Engineering and Management, 2024, 15 : 232 - 242
  • [40] Secure two fold transmission of features using multimodal mask steganography and naive based random visual cryptography system
    Jahnavi, S.
    Nandini, C.
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (01) : 232 - 242