2018 3rd IEEE International Conference on Recent Trends in Electronics, Information &Amp; Communication Technology (RTEICT) 2018
DOI: 10.1109/rteict42901.2018.9012419
|View full text |Cite
|
Sign up to set email alerts
|

Blow Fish and LSB Algorithm based Reversible data hiding in the encrypted image

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…The Blowfish algorithm is a suitable alternative to existing encryption schemes because it is an unpatented, freely available fast algorithm, that Bruce Schneier designed and published in 1993 [18]. Blowfish is fast as it runs on 32-bit microprocessors, small because it can run in less than 5KB of memory [15], and simple since it just employs elementary operations like addition, xanthine oxidoreductase (XOR), and table lookup [19]. It is a symmetric block cipher as it encrypts and decrypts data using the same encryption key.…”
Section: Blowfish Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…The Blowfish algorithm is a suitable alternative to existing encryption schemes because it is an unpatented, freely available fast algorithm, that Bruce Schneier designed and published in 1993 [18]. Blowfish is fast as it runs on 32-bit microprocessors, small because it can run in less than 5KB of memory [15], and simple since it just employs elementary operations like addition, xanthine oxidoreductase (XOR), and table lookup [19]. It is a symmetric block cipher as it encrypts and decrypts data using the same encryption key.…”
Section: Blowfish Algorithmmentioning
confidence: 99%
“…Furthermore, they are merging the above-generated image with the red, green, and blue (RGB) components of a host image to improve privacy and security, resulting in a more secure image. In the manuscript of Swathi et al [15], The image and data have been encrypted using the LSB technique, and after the sender has encrypted the original image, the data-hider will choose and compress a sequence of bits from which some of the given room will be used to create the cipher text. Selected cipher bits will be encoded using the Blowfish algorithm.…”
Section: Introductionmentioning
confidence: 99%