2021
DOI: 10.24996/ijs.2021.62.11.31
|View full text |Cite
|
Sign up to set email alerts
|

Text-based Steganography using Huffman Compression and AES Encryption Algorithm

Abstract: In every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…In the proposed work, a hybrid data compression methodology enhances the input data so that it can be encrypted using the RSA cryptographic method to improve security. Ali and J. M. Kadhim (2021) 4) . The submitted study proposed a text-hiding mechanism for encrypting confidential texts using Unicode characters.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In the proposed work, a hybrid data compression methodology enhances the input data so that it can be encrypted using the RSA cryptographic method to improve security. Ali and J. M. Kadhim (2021) 4) . The submitted study proposed a text-hiding mechanism for encrypting confidential texts using Unicode characters.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Confidentiality, integrity, and availability are three components of information security. This could be accomplished using information concealment techniques such as cryptography and steganography (Lenti, 2000) 4,5). The act of encrypting and decrypting digital data is referred to as cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…Although the Internet is the most practical and pertinent medium for interpersonal communication, sensitive data is vulnerable to several risks. While communicating through the network, the Internet is not always assured [2], [3]. Security is mainly provided by two methods: data hiding and cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…Initially, privileged information may be hidden in cover media via embedding. Second, extractions may be used for recovering secret bits from stego text [10]. In steganography information hiding, there are three characteristics in which the systems compete with each other: security, robustness, and capacity.…”
Section: Introductionmentioning
confidence: 99%