Combining Encryption and Preservation in Information Security to Secure Sending a Message

被引:1
|
作者
Nooh, Sameer [1 ]
机构
[1] Tabuk Univ, Dept Comp Sci, Umluj, Saudi Arabia
关键词
Information Security; Encryption; Information Technology; Steganography; Sending Message;
D O I
10.22937/IJCSNS.2022.22.4.35
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing exchange of data between individuals and institutions through various electronic communication, valuable data protection is in high demand to ensure that it is not hacked and that privacy is protected. Many security techniques, such as encryption and steganography, have emerged to prevent security breaches. The purpose of this research is to integrate cryptographic and steganography techniques to secure text message sending. The Rijndael algorithm was used to encrypt the text message, and the Least Significant Bit algorithm was also used to hide the encrypted message in a color image. Experiments on the suggested method have proven that it can improve the security of sent messages due to the human eye's inability to identify the original image from the image after it has been covered, as well as the encryption of the message using a password.
引用
收藏
页码:285 / 291
页数:7
相关论文
共 50 条
  • [41] Limitations on information-theoretically-secure quantum homomorphic encryption
    Yu, Li
    Perez-Delgado, Carlos A.
    Fitzsimons, Joseph F.
    PHYSICAL REVIEW A, 2014, 90 (05)
  • [42] Electronic information and digitization - Preservation and security challenges
    Anderson, ML
    TO PRESERVE AND PROTECT: THE STRATEGIC STEWARDSHIP OF CULTURAL RESOURCES, 2002, : 207 - +
  • [43] TWO LEVEL ENCRYPTION - A NEW ALGORITHM FOR INFORMATION SECURITY
    Maitra, Subhashis
    ICMEE 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON MECHANICAL AND ELECTRONICS ENGINEERING, 2010, : 71 - 74
  • [44] Broadband optical information security and encryption with achromatic systems
    Tajahuerce, E
    Lancis, J
    Climent, V
    Javidi, B
    Andrés, P
    SYSTEMS OF OPTICAL SECURITY 2003, 2004, 5566 : 44 - 55
  • [45] Modified Advanced Encryption Standard Algorithm for Information Security
    Abikoye, Oluwakemi Christiana
    Haruna, Ahmad Dokoro
    Abubakar, Abdullahi
    Akande, Noah Oluwatobi
    Asani, Emmanuel Oluwatobi
    SYMMETRY-BASEL, 2019, 11 (12):
  • [46] Application of Computer Information Encryption Technology in Network Security
    Aimait, Aikebaier Jiang
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 32 - 34
  • [47] Study on data encryption technology in network information security
    Meng, Jianliang
    Wu, Tao
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2015), 2015, 33 : 325 - 329
  • [48] BAYHENN: Combining Bayesian Deep Learning and Homomorphic Encryption for Secure DNN Inference
    Xie, Peichen
    Wu, Bingzhe
    Sun, Guangyu
    PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 4831 - 4837
  • [49] Secure communication for RFIDs proactive information security within computational security
    Dolev, Shlomi
    Kopeetsky, Marina
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, PROCEEDINGS, 2006, 4280 : 290 - 303
  • [50] Combining Encryption and Stego - Object Processing: A New Direction in Cloud Security
    Kaul, Aishwarya
    Tuli, Sheoli
    Jain, Rachna
    2014 CONFERENCE ON IT IN BUSINESS, INDUSTRY AND GOVERNMENT (CSIBIG), 2014,