The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2017
DOI: 10.14738/tnc.56.3914
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography and Steganography: New Approach

Abstract: Digital communication witnesses a noticeable and continuous development in many applications in the Internet. Hence, secure communication sessions must be provided. The security of data transmitted across a global network has turned into a key factor on the network performance measures. So, the confidentiality and the integrity of data are needed to prevent eavesdroppers from accessing and using transmitted data. Steganography and Cryptography are two important techniques that are used to provide network secur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 8 publications
(8 reference statements)
0
7
0
Order By: Relevance
“…In paper [7], cryptography incorporated steganography is imply (CICS) to supply a highly secure steganography algorithm for the files of the multiple formats, The performance analysis of the tactic and therefore the measurement of the parameters like the PSNR and therefore the SSIM are done to confirm the efficiency of the proffered method. A digital signature is constructed upon the concept of public key encryption.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In paper [7], cryptography incorporated steganography is imply (CICS) to supply a highly secure steganography algorithm for the files of the multiple formats, The performance analysis of the tactic and therefore the measurement of the parameters like the PSNR and therefore the SSIM are done to confirm the efficiency of the proffered method. A digital signature is constructed upon the concept of public key encryption.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Advances in technology have allowed steganography (meaning hidden writing) to occupy a certain position in the field of information encoding and its concealment. Such a trend has emerged in the field of information security as computer steganography (the secret message is hidden in other than original media such as Text, Image, video and audio form) [1][2][3][4]. The general idea of hiding some information in digital content has a wider class of applications that go beyond Steganography.…”
Section: Related Workmentioning
confidence: 99%
“…Unlike information hiding and digital watermarking, the main goal of steganography is to communicate securely in a completely undetectable manner. A steganography task is to hide a certain message in another container file, so that the presence of the hidden message cannot be seen [2,3]. As containers, digital images, audio and video files are commonly used [2,5,7].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations