2013 International Conference on Computing, Electrical and Electronic Engineering (Icceee) 2013
DOI: 10.1109/icceee.2013.6633920
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid approach to secure transmitted messages using advanced encryption standard (AES) and Word Shift Coding Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 1 publication
0
15
0
Order By: Relevance
“…The security analysis with Burrows-Abadi-Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) showed that the proposed scheme was well designed and could withstand MITM attacks, replay attacks, DoS attacks, impersonation attacks and compromised attacks. Altigani and Barry (2013) proposed a new approach combining AES and steganography Word Shift Coding Protocol. AES was used to equip "secret" data with initial confidentiality layer; the encrypted data were represented in binary, and hidden in the textual carrier.…”
Section: Hybrid Security Approach In Data Transmission Related-iotmentioning
confidence: 99%
“…The security analysis with Burrows-Abadi-Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) showed that the proposed scheme was well designed and could withstand MITM attacks, replay attacks, DoS attacks, impersonation attacks and compromised attacks. Altigani and Barry (2013) proposed a new approach combining AES and steganography Word Shift Coding Protocol. AES was used to equip "secret" data with initial confidentiality layer; the encrypted data were represented in binary, and hidden in the textual carrier.…”
Section: Hybrid Security Approach In Data Transmission Related-iotmentioning
confidence: 99%
“…Weak robustness, because by deleting a space, the hidden data will be damaged Word-shift [25][26][27] Hide the secret message 0 in the unchanged space, and 1 bit in the changed space between the neighbors.…”
Section: High Capacitymentioning
confidence: 99%
“…Embedding time [3,5,23,[26][27][28][29][30][31][32] Calculates the time of the technique that the embedding process consumes. Hiding capacity [3,6,11,17,18,20,22,25,27,30,[33][34][35][36][37][38][39][40][41][42][43] It is the maximum number of bits that could be embedded in the cover medium. Imperceptibility [11,17,37,44] Hiding the message in a way that the human vision cannot perceive the difference in the stego medium.…”
Section: Bulletin Of Electr Eng and Infmentioning
confidence: 99%
“…Advanced encryption standard (AES) algorithm [23] represents binary form the secret data to accomplish the process and small quantum increasing or decreasing the covers distance depend on the conforming amount bit in secret binary data…”
mentioning
confidence: 99%
“…In term of effectiveness performance, in word-rule based has taking a long time in process embedding in covering hidden message [5]. Then, the technique also has issue in process development process has complex embedding and extracting, redundancy happened and has limited portion for covering message [15,19,20,21,22,23] that possibly influencing the quality performance of effectiveness technique.…”
mentioning
confidence: 99%