2019 International Conference on Electrical, Computer and Communication Engineering (ECCE) 2019
DOI: 10.1109/ecace.2019.8679136
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Algorithm for Confidentiality, Integrity and Authentication Using Hybrid Cryptography and Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(25 citation statements)
references
References 13 publications
0
25
0
Order By: Relevance
“…Also, there are weaknesses points of SHA-1, suggesting that it need several years to break it. There are other new applications protect against the matters by using another SHA, like SHA-2, or new techniques like random defragmentation [20][21][22][23]. To produce new applications, use Hash functions, there is strong competition for developing SHA-2 to produce SHA-3 in 2012 [24,25].…”
Section: Cryptographic Encryption Algorithmsmentioning
confidence: 99%
“…Also, there are weaknesses points of SHA-1, suggesting that it need several years to break it. There are other new applications protect against the matters by using another SHA, like SHA-2, or new techniques like random defragmentation [20][21][22][23]. To produce new applications, use Hash functions, there is strong competition for developing SHA-2 to produce SHA-3 in 2012 [24,25].…”
Section: Cryptographic Encryption Algorithmsmentioning
confidence: 99%
“…To further strengthen the security of LSB, it is combined with other techniques. In the study of [26], it included the authentication process, the message is encrypted using AES, and the hash value of the message is also encrypted as well as the key using RSA to produce the digital signature. All the encrypted files form the complete message and embedded in the image using steganography.…”
Section: Least Significant Bit (Lsb) Algorithmmentioning
confidence: 99%
“…Chi-Square Test is a simple statistical attack. The test compares the statistical properties of a questionable image with the expected statistical properties of the medium such that it is possible to determine the likelihood that a suspect image is embedded with a message [26]. Having a probability value near zero 0 means that the stego-image cannot be detected using the chi-square test.…”
Section: Chi-square Analysismentioning
confidence: 99%
“…They evaluated the performances of the proposed system based on the communication of UAVs which also includes the control commands and telemetry commands. C. Biswas, U. D. Gupta, and M. M. Haque [3] discuss the hybrid cryptography and steganography. AES encryption is applied to plain text to get cipher text also RSA encryption is used to encrypt the symmetric key used in AES to enhance security.…”
Section: Literature Reviewmentioning
confidence: 99%