2023
DOI: 10.33193/ijser.2.1.2022.53
|View full text |Cite
|
Sign up to set email alerts
|

High Security Image Cryptographic Algorithm Using Chaotic Encryption Algorithm with Hash-LSB Steganography

Abstract: In the latest, digital images are frequently used for storage, communication, medical imaging, etc. Such images possibly involve private data, which accordingly handed an important role to information security. Image encryption and steganography are two widely used techniques for providing information security. Cryptography is the technique of protecting information by encryption and decryption. In steganography, the message is inserted in an image with changes entitled a cover image. The principal purpose of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…In symmetric key cryptography systems, the communicating parties (Alice and Bob) use the same secret key for both encryption and decryption. However, ensuring the secure transfer of this key between the two parties, while preventing access by potential attackers, poses a significant challenge [16].…”
Section: B Secure Key Distributionmentioning
confidence: 99%
“…In symmetric key cryptography systems, the communicating parties (Alice and Bob) use the same secret key for both encryption and decryption. However, ensuring the secure transfer of this key between the two parties, while preventing access by potential attackers, poses a significant challenge [16].…”
Section: B Secure Key Distributionmentioning
confidence: 99%