2020 SoutheastCon 2020
DOI: 10.1109/southeastcon44009.2020.9368301
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Transfer Through Internet Using Cryptography and Image Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…Step 1: Initially, the extracted share values ERSV1, ERSV2, and ERSV3 are combined to reveal the intermediate image dRSSI. dRSSI is as shown in equation (12).…”
Section: Image Extraction From Sharesmentioning
confidence: 99%
“…Step 1: Initially, the extracted share values ERSV1, ERSV2, and ERSV3 are combined to reveal the intermediate image dRSSI. dRSSI is as shown in equation (12).…”
Section: Image Extraction From Sharesmentioning
confidence: 99%
“…The algorithms and techniques that were used have not contained novelty, and they are knowledge gained by hackers in their work. Nunna and Marapareddy [4] developed a web-based application to enable authorized users of the application to communicate and transmit data after embedding in cover images. They achieved two levels of security by using the crypto-steganography technique.…”
Section: Related Workmentioning
confidence: 99%
“…As a result, information hiding emerges at a crucial juncture to address the issue of information security more effectively. Information hiding is now widely investigated and used in a few fields, including secure communications, the defense of intellectual property rights, and content verification [3,4].…”
Section: Introductionmentioning
confidence: 99%
“…Kumar et al [28] presented a new symmetric cryptography method depending on Caesar cipher, where the sender sends the hash code instead of the symmetric key. Nunna and Marapareddy [29] proposed a new system that used both cryptography and steganography techniques by using XOR operation to encrypt text and insert it into the image based on chosen key. A new application was proposed by Pizzolante et al [30] that used to compress and encrypt a message or file, then sends it by using the standard SMS.…”
Section: Related Workmentioning
confidence: 99%