2018
DOI: 10.5815/ijem.2018.01.01
|View full text |Cite
|
Sign up to set email alerts
|

Transmitting Security Enforcement By Text Encrypting and Image Hiding Technique using Combined Encrypt/Hide Keys

Abstract: Comparative study of cryptography and steganography techniques shows that they have some strong and weak points when they used alone. But as we know from soft computing techniques (neural, genetic, and fuzzy computing), that when combining (hybridizing), more than one techniques, by the suitable way to do a job, the outcome will be a better technique with more strong points and less weak points. Work of this paper represents an attempt to prove that combining cryptography with steganography techniques will res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The closer the output file is from the original file, the better the security will be as it is less detectable analysing the image size on The Least Significant Bits has a secret message hidden in it, and by doing so, it demonstrates how statistical analysis algorithms could identify the hidden message rapidly. It scans these least significant bits (LSB) is the base of most Steganographic algorithms [8]. Adding the compression step using Discrete Cosine Transform takes it to another level.…”
Section: Joint Photographic Expert Groupmentioning
confidence: 99%
“…The closer the output file is from the original file, the better the security will be as it is less detectable analysing the image size on The Least Significant Bits has a secret message hidden in it, and by doing so, it demonstrates how statistical analysis algorithms could identify the hidden message rapidly. It scans these least significant bits (LSB) is the base of most Steganographic algorithms [8]. Adding the compression step using Discrete Cosine Transform takes it to another level.…”
Section: Joint Photographic Expert Groupmentioning
confidence: 99%
“…Names, addresses of residence, birthdates, marital statusall these data should be kept in a secured way. However, to protect a printed document from unauthorized access is much harder than to ensure information security in a computer system where a document security management system can be used and both cryptography and steganography can be applied [12,13].…”
Section: B Textual Data Protectionmentioning
confidence: 99%