2020
DOI: 10.1007/978-981-15-4474-3_42
|View full text |Cite
|
Sign up to set email alerts
|

Advanced 3-Bit LSB Based on Data Hiding Using Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Later at (8), the end of the process will result in a group of bytes representing an encrypted chain. At (9), this chain is rebuilt and decrypted using the RSA algorithm. At (10), the original message is presented to the receiver, as shown at (11).…”
Section: A Requirements Specificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Later at (8), the end of the process will result in a group of bytes representing an encrypted chain. At (9), this chain is rebuilt and decrypted using the RSA algorithm. At (10), the original message is presented to the receiver, as shown at (11).…”
Section: A Requirements Specificationmentioning
confidence: 99%
“…Another use case of steganography showcased by Gutub and Alaseri [8] demonstrates this technique's usage within Arabic text, taking as a foundation a single character to hide computer-generated passwords within user-selected passwords. Several prior proposals combine traditional steganography to hide information within multimedia files with cryptography techniques [9]- [15] to encrypt the information or encrypt the whole stage-medium carrying data. Studies using asymmetric cryptosystems such as RSA and steganography [16]- [18] had been proposed in the past.…”
Section: Introductionmentioning
confidence: 99%
“…The researchers are developing new techniques to ensure the security of information and restrict unauthorized users' access to information. For increasing the security of hidden information, several cryptographic and data hiding techniques have been proposed [1,2].…”
Section: Introductionmentioning
confidence: 99%