2017 Annual Conference on New Trends in Information &Amp; Communications Technology Applications (NTICT) 2017
DOI: 10.1109/ntict.2017.7976154
|View full text |Cite
|
Sign up to set email alerts
|

An efficient image cryptography using hash-LSB steganography with RC4 and pixel shuffling encryption algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(25 citation statements)
references
References 1 publication
0
25
0
Order By: Relevance
“…In this work, statistical analysis has been performed to demonstrate the superior confusion and diffusion properties of the proposed lightweight cryptographic designs against statistical attacks. is is done by performing a series of tests: histogram analysis of the encrypted images, correlation computation of the adjacent pixels in encrypted images, and information entropy calculation [28].…”
Section: Security Analysismentioning
confidence: 99%
“…In this work, statistical analysis has been performed to demonstrate the superior confusion and diffusion properties of the proposed lightweight cryptographic designs against statistical attacks. is is done by performing a series of tests: histogram analysis of the encrypted images, correlation computation of the adjacent pixels in encrypted images, and information entropy calculation [28].…”
Section: Security Analysismentioning
confidence: 99%
“…Abood combined image cryptography with steganography [17]. Both encryption and decryption are done using RC4 stream cipher and a hash function along with RGB pixel shuffling are used for steganalysis.…”
Section: Literature Reviewmentioning
confidence: 99%
“…elements of second row are shifted by one byte to the left, elements of third row are shifted by two bytes and fourth row elements are shifted by three bytes. This can be represented as given in (2) (2)…”
Section: A Aes Encryption Modulementioning
confidence: 99%
“…The multimedia data is exchanged in an open environment which is considered prone to the security threats hence security is the prime concern in the multimedia and infotainment applications. Several researches have been carried out to enable the security, these techniques are based on the watermarking [1], cryptography [2] and steganography [3] concept. According to the digital watermarking, the information which need to be hide is known as watermark.…”
Section: Introductionmentioning
confidence: 99%