Combining Encryption and Preservation in Information Security to Secure Sending a Message

被引:1
|
作者
Nooh, Sameer [1 ]
机构
[1] Tabuk Univ, Dept Comp Sci, Umluj, Saudi Arabia
关键词
Information Security; Encryption; Information Technology; Steganography; Sending Message;
D O I
10.22937/IJCSNS.2022.22.4.35
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing exchange of data between individuals and institutions through various electronic communication, valuable data protection is in high demand to ensure that it is not hacked and that privacy is protected. Many security techniques, such as encryption and steganography, have emerged to prevent security breaches. The purpose of this research is to integrate cryptographic and steganography techniques to secure text message sending. The Rijndael algorithm was used to encrypt the text message, and the Least Significant Bit algorithm was also used to hide the encrypted message in a color image. Experiments on the suggested method have proven that it can improve the security of sent messages due to the human eye's inability to identify the original image from the image after it has been covered, as well as the encryption of the message using a password.
引用
收藏
页码:285 / 291
页数:7
相关论文
共 50 条
  • [21] Information Theoretically Secure Encryption with Almost Free Authentication
    Alomair, Basel
    Poovendran, Radha
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (15) : 2937 - 2956
  • [22] Homomorphic Encryption for Secure Information Retrieval from the Cloud
    Anand, V.
    Satapathy, Suresh Chandra
    FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [24] Performance Analysis of Encryption Algorithms for Information Security
    Ramesh, A.
    Suruliandi, A.
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013), 2013, : 840 - 844
  • [25] Optical information processing for encryption and security systems
    Javidi, B
    PHOTONIC PROCESSING TECHNOLOGY AND APPLICATIONS, 1997, 3075 : 122 - 128
  • [26] Hybrid Encryption Algorithm for Information Security in Hadoop
    Filaly, Youness
    El Mendili, Fatna
    Berros, Nisrine
    Idrissi, Younes El Bouzekri E. L.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 1295 - 1303
  • [27] A quantum secure direct communication protocol for sending a quantum state and its security analysis
    Murakami, Yumiko
    Nakanishi, Masaki
    Yamashita, Shigeru
    Nakashima, Yasuhiko
    Hagiwara, Manabu
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND PRIVACY (ISP '07): ADVANCED TOPICS IN INFORMATION SECURITY AND PRIVACY, 2007, : 91 - +
  • [28] Combining Fragmentation and Encryption to Ensure Big Data at Rest Security
    Heni, Houyem
    Ben Abdallah, Marwa
    Gargouri, Faiez
    HYBRID INTELLIGENT SYSTEMS, HIS 2017, 2018, 734 : 177 - 185
  • [29] Leakage-Resilient Key-Dependent Message Secure Encryption Schemes
    Gupta, Dhairya
    Rajasree, Mahesh Sreekumar
    Swaminathan, Harihar
    PROGRESS IN CRYPTOLOGY-INDOCRYPT 2024, PT I, 2025, 15495 : 234 - 257
  • [30] Multi-input Functional Encryption with Unbounded-Message Security
    Goyal, Vipul
    Jain, Aayush
    O'Neill, Adam
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 531 - 556