The establishment of a secure communication between two communicating parties is becoming a difficult problem due to the likelihood of attacks and other unintentional changes during an active communication over an unsecured network. However, the security of secret information can be secured using either cryptography or steganography. Steganography refers to the practice of concealing a message (with no traceability) in a manner that it will make no meaning to anyone else except the intended recipient, while cryptography, on the other hand, refers to the art of converting a plaintext (message) into an unreadable format. Thus, steganography conceals the existence of a secret message while cryptography alters the message format itself. Both steganographic and cryptographic techniques are powerful and robust. In this paper, the major aim is to review several ways of combining steganographic and cryptographic techniques to achieve a hybrid system. Moreover, some of the differences between cryptographic and steganographic techniques were presented as well.
The essential objective of this study examines the rising consciousness pertaining to varying notions that are associated with regards to electronic payment systems, related to the benefits, challenges and security concerns. By utilizing software as a service platform, the vendors of the payment processing system work on this template which will channel the payment traffic from the single payment towards the multiple payment schemes for the clienteles. Consumers frequently disclose data that is confidential that belongs to them for example, names, particulars about their cards and numerous other information during their online transactions to perform a payment. A method that assists in the transference of money electronically defines the online payment system. This payment manner generally entails the array of a network of computers, the internet and various other repositories for digitized value methods. By acquiring whatsoever means of payment via the internet entails that the user of the system has received payment made online, and has a mutual knowledge of certain private data with the vendor or the entity that provides the service. This study initiates a comprehensive holistic review encompassing the whole components of payments made online or electronically, that focuses on an investigation over the various researches done pertaining to payment methods that are executed electronically. The current most up-to-date researches were examined to garner an insightful comprehension of payment methods that are electronically employed.
With increasing transmission of sensitive information over the dispersed IoTs, security of sensitive patient’s contents is becoming more challenging and has been enthusiastic area of research since last decades. Evolution in the concealment of data was reflected in the medical field specifically on medical images. Hide information technology in the image is called steganography. The objective of this study is the preservation of privacy and confidentiality of data in uncertain surroundings during multimedia exchange joining two IoT hops. For attacker hindrance and, provision of data confidentiality, a resilient multilevel security perspective depending on information hiding and cryptography is suggested. The existing schemes have limitations related to the equilibrium trade-off amid two variables (medical image quality and security). In addition, the direct embedment of the secret data into the images and further subtraction of an encrypted data from it often enables the intruders to easily detect and extract the hidden information. Based on these factors, we proposed a multilevel security based on 3 th random iterations with chosen a procedure was implemented using Henon function to stop against cybercrimes challenges. The patient information is going through the preparation stage (different steps) before the embedding algorithm in order to increase the security. Superior results achieved with this study in term of imperceptibility and security the reason is to choose the right method in the right place. Satisfying results, gained when benchmarking our results with existing one in literature through the same criteria.
Recently, steganography has played an important part in the field of communication, especially in image steganography. The major points of image steganography are the image quality (imperceptibility) of the stego image and the security of the system towards stopping the recoverability of the secret data. A new steganography scheme based on two control random parameters and multi-level encryption can address the security challenge while the P_Even/P_Odd classification can ensure the imperceptibility of the stego image. The objectives of study to increase the security and PSNR of the image by using the Huffman coding technique to compress the secret data prior to embedding; this will also ensure an increase in the payload capacity. The proposed scheme takes effect after encrypting and compressing the secret data. It is deployed when matching the secret bits with the LSB during embedding to determine 0 (P_Even) and 1 (P_Odd) while classifying the secret message to track and map each bit in the stego image. The results showed the embedding of the secret message based on P_Even/P_Odd with two control random parameters and multi-level encryption to improve the steganography.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.