2019
DOI: 10.48084/etasr.2380
|View full text |Cite
|
Sign up to set email alerts
|

A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages

Abstract: Steganography and cryptography are very important techniques used in data security to hide and secure secret messages in transmitted data. This paper will introduce, implement and test a novel methodology which can be used as a secure and highly efficient method of data hiding and data extracting. Some efficiency parameters will be experimentally obtained and compared with other existing methods parameters to prove the efficiency of the proposed methodology.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
28
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(28 citation statements)
references
References 5 publications
0
28
0
Order By: Relevance
“…Fig. 5 shows a comparison of the encryption time, decryption time, and total time, of the proposed method and existing methods: Selected Position Method [38], Matrix Reordering [39], Chaotic Algorithm [40], 3D Chaotic Map [41], Rubik's Cube [42], Poker Shuffle [43]. It also shows the speed up of the proposed method with respect to these methods.…”
Section: Performance and Comparative Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Fig. 5 shows a comparison of the encryption time, decryption time, and total time, of the proposed method and existing methods: Selected Position Method [38], Matrix Reordering [39], Chaotic Algorithm [40], 3D Chaotic Map [41], Rubik's Cube [42], Poker Shuffle [43]. It also shows the speed up of the proposed method with respect to these methods.…”
Section: Performance and Comparative Analysismentioning
confidence: 99%
“…5 that the proposed method outperforms all other existing method. It should be noted that the times of the existing methods have been taken from [38], and the speed up of the proposed method with respect to other methods was calculated as follows:…”
Section: Performance and Comparative Analysismentioning
confidence: 99%
“…The combination of steganography and cryptography technologies can be a prime solution to strengthen security and maintain the confidentiality of data [3], where the main purpose of cryptography and steganography methods is to protect data from unauthorized persons. The process of getting the secret message (extracting the message) can be done by applying the cryptography and then the steganography based on the methods used in the hiding phase, where the selected methods for data hiding-extraction and data encryption-decryption must be secure and efficient [4].…”
Section: Introductionmentioning
confidence: 99%
“…-Providing a maximum similarity between the covering and the holding images: minimizing the mean square error (MSE) and maximizing peak signal to noise ratio (PSNR) between the covering and the holding images [10], [14], [15].…”
Section: Introductionmentioning
confidence: 99%