2022
DOI: 10.11591/eei.v11i1.3279
|View full text |Cite
|
Sign up to set email alerts
|

Audio steganography with enhanced LSB method for securing encrypted text with bit cycling

Abstract: Data security pressing issue, particularly in terms of ensuring secure and reliable data transfer over a network. Encryption and seganography play a fundamental role in the task of securing data exchanging. In this article, both steganography and cryptography were combined to produce a powerful hybrid securing stego-system. Firstly, a text message is encrypted with a new method using a bits cycling operation to give a cipher text. In the second stage, an enhanced LSB method is used to hide the text bits random… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 33 publications
(36 citation statements)
references
References 25 publications
0
36
0
Order By: Relevance
“…However, these blockchain based protocols are vulnerable to 51% attacks. In addition, they have high storage and computation complexities [162]. These complexities result in high latencies which cause inconvenience for users [163].…”
Section: Related Workmentioning
confidence: 99%
“…However, these blockchain based protocols are vulnerable to 51% attacks. In addition, they have high storage and computation complexities [162]. These complexities result in high latencies which cause inconvenience for users [163].…”
Section: Related Workmentioning
confidence: 99%
“…As shown in Figure 2, all the transmitted data need to be enciphered using strong encryption algorithms. Although numerous data security [167] schemes have been developed over the recent past, they have been shown to have a number of security and privacy issues. For instance, techniques such as digital signatures, Advanced Encryption Standards (AES), public key infrastructure (PKI) and elliptic curve cryptography point multiplications may be inefficient for the resource limited WBAN devices.…”
Section: Figure 2 Proposed Communication Architecturementioning
confidence: 99%
“…However, combining steganography and encryption increases data security. "The objective of audio steganography is to hide the information contained within the audio files") 1 . The Internet, in digital form, allows people all over the world to share information (Fricker & Schonlau, 2002) 1,2,3) .…”
Section: Introductionmentioning
confidence: 99%
“…"The objective of audio steganography is to hide the information contained within the audio files") 1 . The Internet, in digital form, allows people all over the world to share information (Fricker & Schonlau, 2002) 1,2,3) . The security of digital data against any type of access, attack, or theft is the key issue.…”
Section: Introductionmentioning
confidence: 99%