2021
DOI: 10.36909/jer.v9i3a.10111
|View full text |Cite
|
Sign up to set email alerts
|

Varying PRNG to improve image cryptography implementation

Abstract: Securing information became essential to exchange multimedia information safely. These exchanged data need to be transformed in a well-managed, secure, and reliable manner. This paper focuses on securing multimedia images via cryptography during transmission among users using an effective selection from several Pseudorandom Number Generators (PRNG). This paper implements several PRNG techniques involved within consecutive cryptoprocesses of substitution and transposition that have proven a secure process. In t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 21 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Future work can be pursued to examine the feasibility of increasing the length of secret keys. A random generation number can be included to generate the shares that may show a different level of privacy and trustfulness, similar to PRNG variations of [41]. Furthermore, in our work, we used merely two image steganography algorithms which are LSB and DWT.…”
Section: Discussionmentioning
confidence: 99%
“…Future work can be pursued to examine the feasibility of increasing the length of secret keys. A random generation number can be included to generate the shares that may show a different level of privacy and trustfulness, similar to PRNG variations of [41]. Furthermore, in our work, we used merely two image steganography algorithms which are LSB and DWT.…”
Section: Discussionmentioning
confidence: 99%
“…This technique uses more specific userbased storage positions such as forms for inter-word, intersentence, end of the paragraph and end-of-line spaces in concealing the secret information. Another form of double spaces combination used for embedding the secret data as shown in Table 2 as related to [36]. The advantage of this technique is that the combination of spaces gives more embedding of secret data that implies increasing capacity than the previous one.…”
Section: Case 2: If the Letter Is Un-pointedmentioning
confidence: 99%
“…Steganography has become one the most popular methods for information hiding because of its simplicity and easy communication through already existing technology and communication channels like IP cameras, smartphones, and social media apps like WeChat, WhatsApp, Telegram, Signal, etc. without any extra cost of additional infrastructures like private key sharing or private communication channels, etc. There have been various works which have not included deep learning in their work, however, have contributed in the field of watermarking and steganography (Hassaballah et al, 2020;Gutub and Al-Ghamdi, 2020;Gutub and Al-Roithy, 2021;Hassan and Gutub, 2021;Al-Roithy and Gutub, 2021;AlKhodaidi and Gutub, 2021;Hameed, Abdel-Aleem and Hassaballah, 2022;Gutub, 2022aGutub, , 2022b.…”
Section: Introductionmentioning
confidence: 99%