2021
DOI: 10.1007/s12553-021-00602-1
|View full text |Cite
|
Sign up to set email alerts
|

Double layer security using crypto-stego techniques: a comprehensive review

Abstract: Recent advancement in the digital technology and internet has facilitated usage of multimedia objects for data communication. However, interchanging information through the internet raises several security concerns and needs to be addressed. Image steganography has gained huge attention from researchers for data security. Image steganography secures the data by imperceptibly embedding data bits into image pixels with a lesser probability of detection. Additionally, the encryption of data before embedding provi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 117 publications
0
7
0
Order By: Relevance
“…As the proposed method involves both the cryptographic and steganographic concepts (19,21,22) for strengthening the security, it is called Dual Level Security Scheme (DLSS). Cryptography is the process of converting the plain signal into cipher signal, on the other hand, Steganography is the process of hiding the secret signal in covering signal.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…As the proposed method involves both the cryptographic and steganographic concepts (19,21,22) for strengthening the security, it is called Dual Level Security Scheme (DLSS). Cryptography is the process of converting the plain signal into cipher signal, on the other hand, Steganography is the process of hiding the secret signal in covering signal.…”
Section: Methodsmentioning
confidence: 99%
“…Recent researches shows transformations of secret image data aids to handle the signal (15)(16)(17)(18)(19)(20) more efficiently and hide into cover audio signal (19) . Crypto-Stegano approaches incorporates various algorithms respectively to adapt domain secret images (21,22) . Based on the analysis of various existing approaches and recent methodologies, the secure DLSS scheme is proposed to enhance the security.…”
Section: Introductionmentioning
confidence: 99%
“…the goal of the study in [6] is to briefly present latest evolvement within the zone of data security employing combining steganography with cryptography (crypto-stego) approaches certifying two-layer security for secret communication. The advantages and disadvantages of the present image steganography methods and crypto-stego approaches were highlighted.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It is in the form of unreadable characters and suspicious code. Meanwhile, steganography is a method to hide a secret message in a particular medium, such as text, image, audio or video (Agath, Sidpara, & Upadhyay, 2018;Jan et al, 2022). The message is hidden in the cover text, and the final result of steganography is called a stego text.…”
Section: Figurementioning
confidence: 99%
“…Data communication over the Internet has increased significantly, resulting in high traffic and concerns about the security of transmitted data (Jan, Parah, Hussan, & Malik, 2022;Mahato, Khan, & Yadav, 2017). Moreover, information transmitted over the Internet always catches the attention of intruders, which causes the security of sensitive data (Majeed & Sulaiman, 2021;Maniriho & Ahmad, 2017), and it is a severe problem and needs to be preserved to prevent leakage (Bhat, Prabhu, & Renuka, 2017;Jan et al, 2022;Joseph & Vishnukumar, 2015). Therefore, it is necessary to protect sensitive data so irresponsible parties cannot access it (Pujari & Shinde, 2016).…”
Section: Introductionmentioning
confidence: 99%