2017
DOI: 10.5120/ijca2017915145
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach for Improving Security by Digital Signature and Image Steganography

Abstract: Information security is becoming more and more vital with the progress in the exchange of data. Protected communication in the network is a key necessity. Propose a novel technique to encrypt the image and embed the digital signature into the image. A digital signature is a procedure used to certify the authenticity and integrity of a message, software and digital documents. It is a also worn to give testimony of non-repudiation of communications. Steganography is an encryption technique that can be used along… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 17 publications
(16 reference statements)
0
0
0
1
Order By: Relevance
“…Tanda tangan digital adalah satu-satunya teknik terbaik untuk memberikan otentikasi dan nir-penyangkalan dengan menggunakan algoritma kunci publik. Oleh karenanya, penerapan tanda tangan digital akan memberikan integritas pada system (Carita & Wahyuni, 2022;Sharma & Kapoor, 2017) .…”
Section: Brainstromunclassified
“…Tanda tangan digital adalah satu-satunya teknik terbaik untuk memberikan otentikasi dan nir-penyangkalan dengan menggunakan algoritma kunci publik. Oleh karenanya, penerapan tanda tangan digital akan memberikan integritas pada system (Carita & Wahyuni, 2022;Sharma & Kapoor, 2017) .…”
Section: Brainstromunclassified
“…The picture is well-known for covering objects which is also an encryption method in steganography. Java is here to support the efficiency of the proposed model under various key lengths, encrypted text lengths, message lengths, times for encryption, and time for decryption (Sharma and Kapoor, 2017). An analysis of different cryptographic hash algorithms and the essential reasoning behind them is given by Kale and Dhamdhere (2018).…”
Section: Related Workmentioning
confidence: 99%