Combining Encryption and Preservation in Information Security to Secure Sending a Message

被引:1
|
作者
Nooh, Sameer [1 ]
机构
[1] Tabuk Univ, Dept Comp Sci, Umluj, Saudi Arabia
关键词
Information Security; Encryption; Information Technology; Steganography; Sending Message;
D O I
10.22937/IJCSNS.2022.22.4.35
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing exchange of data between individuals and institutions through various electronic communication, valuable data protection is in high demand to ensure that it is not hacked and that privacy is protected. Many security techniques, such as encryption and steganography, have emerged to prevent security breaches. The purpose of this research is to integrate cryptographic and steganography techniques to secure text message sending. The Rijndael algorithm was used to encrypt the text message, and the Least Significant Bit algorithm was also used to hide the encrypted message in a color image. Experiments on the suggested method have proven that it can improve the security of sent messages due to the human eye's inability to identify the original image from the image after it has been covered, as well as the encryption of the message using a password.
引用
收藏
页码:285 / 291
页数:7
相关论文
共 50 条
  • [31] New method of key-dependent message security for asymmetric encryption
    Lai, Qiqi
    Hu, Yupu
    Chen, Yuan
    Wang, Baocang
    Wang, Fenghe
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2157 - 2170
  • [32] Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption
    Kitagawa, Fuyuki
    Tanaka, Keisuke
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 32 - 61
  • [34] SECURE CYBER SECURITY THREAT INFORMATION EXCHANGE
    Ionita, Mihai-Gabriel
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY (IE 2015): EDUCATION, RESEARCH & BUSINESS TECHNOLOGIES, 2015, : 63 - 67
  • [35] Security Notions for Information Theoretically Secure Encryptions
    Iwamoto, Mitsugu
    Ohta, Kazuo
    2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2011,
  • [36] Secure information exchange - A security quantification approach
    Perka, Vilas Rao
    Mishra, Piyush
    2006 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2006, : 448 - 453
  • [37] Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously
    Kitagawa, Fuyuki
    Nishimaki, Ryo
    Tanaka, Keisuke
    Yamakawa, Takashi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 521 - 551
  • [38] KDM-CCA Security from RKA Secure Authenticated Encryption
    Lu, Xianhui
    Li, Bao
    Jia, Dingding
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 : 559 - 583
  • [39] An efficient dispersal and encryption scheme for secure distributed information storage
    Choi, SJ
    Youn, HY
    Lee, BK
    COMPUTATIONAL SCIENCE - ICCS 2003, PT IV, PROCEEDINGS, 2003, 2660 : 958 - 967
  • [40] Secure Information Aggregation for Smart Grids Using Homomorphic Encryption
    Li, Fengjun
    Luo, Bo
    Liu, Peng
    2010 IEEE 1ST INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2010, : 327 - 332