2017
DOI: 10.5455/jjcit.71-1494855263
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Technique for Securing Data Communication Systems by Using Cryptography and Steganography

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Steganography was also suspected to be used in the attacks of World Trade Centre (Bachrach and Shih, 2011). Steganography employs different carrier medium such as text, images, audio and video (Al-Qwider and Salameh, 2017;Khan and Gutub, 2007;Nosrati et al, 2012;Singh et al, 2014). Text is considered as secure carrier and hard to decode but at the same time it's a great challenge to make it high capacitive along with robustness and data integrity (Singh et al, 2014).…”
Section: Introductionmentioning
confidence: 99%
“…Steganography was also suspected to be used in the attacks of World Trade Centre (Bachrach and Shih, 2011). Steganography employs different carrier medium such as text, images, audio and video (Al-Qwider and Salameh, 2017;Khan and Gutub, 2007;Nosrati et al, 2012;Singh et al, 2014). Text is considered as secure carrier and hard to decode but at the same time it's a great challenge to make it high capacitive along with robustness and data integrity (Singh et al, 2014).…”
Section: Introductionmentioning
confidence: 99%
“…The technology of information hiding become a more popular and demanding academic as well as research zone for the students and researchers, because of their high demanding applications based model such as copyright in media, watermarking for copyright protection, fingerprinting or face based authentication module, steganography for general purpose or medical data security [2]. Image or data based steganography approach is the most ideal method for hiding a secret message in harmless media bearers (image, audio, video and text) [3]. But steganography approach can fail in some cases and important information may be leaked, so, we need to create a most secure approach.…”
Section: Introductionmentioning
confidence: 99%