2017 3rd International Conference on Computational Intelligence &Amp; Communication Technology (CICT) 2017
DOI: 10.1109/ciact.2017.7977303
|View full text |Cite
|
Sign up to set email alerts
|

Multiple layer text security using variable block size cryptography and image steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 34 publications
(17 citation statements)
references
References 12 publications
0
16
0
1
Order By: Relevance
“…In [17], the authors suggested a hybrid technique to secure the secret data that use the behaviors of steganography (LSB, raster scan technique) and cryptography (symmetric key). Using a symmetric key cryptography technique, which is contentbased and uses the block cypher principles, the secret text will first be encrypted, but the size of the block in this technique is not determined, depending on the length of the term (word).…”
Section: Literature Work / Reviewmentioning
confidence: 99%
“…In [17], the authors suggested a hybrid technique to secure the secret data that use the behaviors of steganography (LSB, raster scan technique) and cryptography (symmetric key). Using a symmetric key cryptography technique, which is contentbased and uses the block cypher principles, the secret text will first be encrypted, but the size of the block in this technique is not determined, depending on the length of the term (word).…”
Section: Literature Work / Reviewmentioning
confidence: 99%
“…Here the system is upgraded to enhance the security of data in cloud [2].The method proposes here uses mixture of cryptography and image steganography. The cryptographic method used for encrypting the confidential message is based on content encryption algorithm and the techniques which are used for steganography are LSB and raster scan techniques [3].The paper shows multiple terminologies used for the technique and problem associated with the security. The paper has taxonomy for the published techniques, which focus on techniques of Cryptography and Steganography as well as Combined Cryptography and Steganography Techniques [4].The work in this paper shows two level of security on data.…”
Section: Literature Surveymentioning
confidence: 99%
“…In this paper, a hybrid technique is introduced by combining the cryptography and Steganography properties. Also for data encryption vary the block size in place of fixed block [2]. Secured model has been developed by combining cryptographic and Steganographic security.…”
Section: Related Workmentioning
confidence: 99%