2022
DOI: 10.5109/4843115
|View full text |Cite
|
Sign up to set email alerts
|

Message Security Enhanced By Bit Cycling Encryption and Bi-LSB Technique

Abstract: Steganography is a powerful and effective data-hiding technique that has received great interest in recent years due to its effectiveness in maintaining the security of data transferred over the internet. To provide safe data transfer, various steganography technologies have lately been presented and developed. Steganography and encryption are basic methods of securing data exchange. A new algorithm is encrypted based on text messages and exchanges the bit positions around a key point using the Bi-LSB (Bi-Leas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Nevertheless, as the practical experience of using such experimental and design developments shows, based on the results of the tests of the space system, not in all cases the conditional parameters indicated in the terms of reference can be confirmed. In addition to the inevitable production errors, the sequential decrease in quality indicators can also be conditioned by the small depth of research carried out at the design stage (the lack of taking into account one or another influencing factor, and the problems of accuracy of incomplete accounting of the ongoing physical processes 23) .…”
Section: Discussionmentioning
confidence: 99%
“…Nevertheless, as the practical experience of using such experimental and design developments shows, based on the results of the tests of the space system, not in all cases the conditional parameters indicated in the terms of reference can be confirmed. In addition to the inevitable production errors, the sequential decrease in quality indicators can also be conditioned by the small depth of research carried out at the design stage (the lack of taking into account one or another influencing factor, and the problems of accuracy of incomplete accounting of the ongoing physical processes 23) .…”
Section: Discussionmentioning
confidence: 99%
“…Sumathi et al propose a hybrid cryptographic approach using artificial intelligence (AI) and the Internet of Things (IoT) that fills the lack of a well-known traditional cryptographic method 14) . Gera et al proposed bit-cycling encryption and bi-LSB techniques to show how audio steganography may be used to hide encrypted text 15) . Shaiden et al proposed a fusion of two algorithms (LSB and PSNR) to hide information inside a cover image that could be implemented effectively on social media platforms such as WhatsApp 16) .…”
Section: Introductionmentioning
confidence: 99%