Modern computer networks make it possible to distribute documents quickly and economically. This is because of the decreasing cost of the equipment needed to copy, print, process the information. The widespread adoption of electronic distribution of material is accompanied with more emphasis on data security. One of the modern data security methods is Visual Cryptography. Visual Cryptography(VC) is the technique that is used for securing data specially image-based secrets such as credit card information, personal health information, military maps and personally identifiable information and commercial identification data.Visual Cryptography allow us to share secret effectively and efficiently, the secret image can be distributed in to two or more shares, when shares are superimposed exactly together the original image would be discovered with human visual system(HVS) without out aid of computer or without performing complicated computations.
Due to the rapid development of distributed computing systems, the use of local networks, and the huge expansion of the Internet, the process of maintaining the confidentiality of information becomes important and necessary. Encryption is one of the most important ways to keep information confidential and to prevent unauthorized people from disclosing this information. Many cryptographic algorithms have appeared in different ways and methods. But most of these algorithms have been devoted for encrypting texts in the English language. Because of the increasing important and sensitive information exchange in the Arabic language by users on the Internet, an urgent need has appeared to build dedicated encryption systems for the Arabic language. The aim of this research is to provide a proposed encryption method that uses the idea of combining the methods of transposition and substitution cipher for the purpose of Arabic texts confidentiality. This research depends on using diacritics in the Arabic language to perform the process of substitution cipher. The efficiency of the proposed method has been tested on different texts; the method provides high speed execution, the length of the encrypted texts is almost close to the clear text length, and the confidentiality of the resulting encrypted texts is high.
Modern computer networks make it possible to distribute documents quickly and economically. This is because of the decreasing cost of the equipment needed to copy, print, process the information. The widespread adoption of electronic distribution of copyrighted material is accompanied by illicit copying and illicit distribution. This is why people used steganography. Steganography is the art of hiding transmitting data through apparently innocuous carriers in an effort to conceal the existence of the data.The carrier can be anything used to transfer information, including for example: wood or state tablets, hollow heels, images under stamps, tiny photographs, or word arrangements. Digital carriers include: disk space, disk partitions, text, e-mail, audio, images, and video.In this paper, we propose a new conceptual framework for text file steganography by using integrity tool. Hash function was used to produce a checksum.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.