2020 International Conference on Smart Electronics and Communication (ICOSEC) 2020
DOI: 10.1109/icosec49089.2020.9215442
|View full text |Cite
|
Sign up to set email alerts
|

A New Approach to Hiding Data in the Images Using Steganography Techniques Based on AES and RC5 Algorithm Cryptosystem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Other investigations that use combination with steganography and cryptography is the work of Al-Mamun et al [27], proposes that the image pixels are randomly selected using the Stern-Brocot sequence, while the keying is achieved with multiple LSBs of color components (RGB). On the other hand, Hossen et al [28] applies a cryptosystem with advanced encryption standard (AES) and Rivest cipher 5 (RC5). Kordov and Zhelezov [29] propose an approach to hide secret text messages in color images, combining steganography and cryptography.…”
Section: 𝐼 = 𝑈𝑆𝑉 𝑡mentioning
confidence: 99%
“…Other investigations that use combination with steganography and cryptography is the work of Al-Mamun et al [27], proposes that the image pixels are randomly selected using the Stern-Brocot sequence, while the keying is achieved with multiple LSBs of color components (RGB). On the other hand, Hossen et al [28] applies a cryptosystem with advanced encryption standard (AES) and Rivest cipher 5 (RC5). Kordov and Zhelezov [29] propose an approach to hide secret text messages in color images, combining steganography and cryptography.…”
Section: 𝐼 = 𝑈𝑆𝑉 𝑡mentioning
confidence: 99%
“…Several works focus on the role of information hiding techniques in digital forensics [21]- [23]. Among them, some address alternatives for secret communication through means of steganography [22], [24], [25] whereas others apply watermark following different goals [26]- [29].…”
Section: Related Workmentioning
confidence: 99%
“…It is commonly used in emails or electronic documents. No third-party user can encrypt or decrypt secret messages with any kind of hack tools or methods [19]. So the data or secret messages are secured and authenticated.…”
Section: Digital Signaturementioning
confidence: 99%