2022
DOI: 10.1007/s11042-022-12084-y
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE: A novel approach for dual layer security of message using Steganography and Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…In the past, to avoid such situations and conceal the fact of transferring secret information, steganography has often been a frequently employed method. In contrast to cryptography, which aims to conceal the message's contents, steganography aims to hide the message's existence (Bansal & Badal, 2022). In other words, if cryptography makes the understandable unreadable, then steganography makes the visible invisible.…”
Section: Development Of Novel Comparison Based Steganography Algorith...mentioning
confidence: 99%
“…In the past, to avoid such situations and conceal the fact of transferring secret information, steganography has often been a frequently employed method. In contrast to cryptography, which aims to conceal the message's contents, steganography aims to hide the message's existence (Bansal & Badal, 2022). In other words, if cryptography makes the understandable unreadable, then steganography makes the visible invisible.…”
Section: Development Of Novel Comparison Based Steganography Algorith...mentioning
confidence: 99%
“…Information security become in need due to the increasing transferring for sensitive information through the internet. A lot of available works in the information security system trying to mix two or more levels of security that's depends on the user demands and the importance of the information itself these levels can be achieved using steganography and cryptography as well [1][2][3][4]. In the cryptography algorithms the secrete message encrypted to achieve conditionality for the information the steganography used to hide the encrypted message in the appropriate cover this process one of a several ways to use steganography and cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, wireless technology becomes a dominant way of communication. Sending and receiving pictures via wireless network is predominantly popular (Bansal & Badal, 2022). Despite wireless communication medium has a small bandwidth size and vulnerable to intruders.…”
Section: Introductionmentioning
confidence: 99%