2021
DOI: 10.1109/access.2021.3060317
|View full text |Cite
|
Sign up to set email alerts
|

Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 89 publications
(40 citation statements)
references
References 34 publications
0
23
0
1
Order By: Relevance
“…However, according to [13] and [14], this scheme is not being better, and this back to two reasons: the processing time consumed in the redundant data encryption and second due to an attacker can access the original data due to more hints. In [15], data are encrypted through combination of RSA, Steganography and Huffman coding with DWT. They have ensured the algorithm efficiency through different metrics such as compression ratio, PSNR, SSIM, and compression saving.…”
Section: Encryption-compression (E-c) Methodsmentioning
confidence: 99%
“…However, according to [13] and [14], this scheme is not being better, and this back to two reasons: the processing time consumed in the redundant data encryption and second due to an attacker can access the original data due to more hints. In [15], data are encrypted through combination of RSA, Steganography and Huffman coding with DWT. They have ensured the algorithm efficiency through different metrics such as compression ratio, PSNR, SSIM, and compression saving.…”
Section: Encryption-compression (E-c) Methodsmentioning
confidence: 99%
“…For this reason, it is preferred in steganography studies where large amounts of data are hidden. However, data hiding and extracting from stego-multimedia in this domain take much more time than the examples seen in other domains [34].…”
Section: Steganography: An Overviewmentioning
confidence: 99%
“…According to the results, combining the methods outperforms utilizing solely the LSB steganography technique. Following that, Wahab et al [26] proposed using a combination of RSA and Huffman coding, Run-length encoding (RLE), or DWT to compress and secure messages to produce a high-quality stego-image. The results of the experiments show that the proposed module has a higher quality and storage capacity than other strategies.…”
Section: Related Workmentioning
confidence: 99%
“…Incorporation, on the other hand, will increase computation time, necessitating the use of a correct merging mechanism. Huffman Coding Polybius Cipher LSB [26] Huffman or DWT RSA LSB [27] Goldbach code ----LSB [28] Huffman coding Vigenère cipher LSB [29] LZW AES knight tour algorithm [30] LZW AES LSB…”
Section: Related Workmentioning
confidence: 99%