2022
DOI: 10.11591/ijeecs.v25.i1.pp238-246
|View full text |Cite
|
Sign up to set email alerts
|

Design secure multi-level communication system based on duffing chaotic map and steganography

Abstract: Cryptography and steganography are among the most important sciences that have been properly used to keep confidential data from potential spies and hackers. They can be used separately or together. Encryption involves the basic principle of instantaneous conversion of valuable information into a specific form that unauthorized persons will not understand to decrypt it. While steganography is the science of embedding confidential data inside a cover, in a way that cannot be recognized or seen by the human eye.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 23 publications
(29 reference statements)
0
1
0
Order By: Relevance
“…This algorithm was invented eight years after RSA's creation. Later, many techniques have been proposed on one or more of the previously mensioned approaches [34]- [38].  RSA: in [25], [27] the RSA encryption algorithm is an example of asymmetric cryptography, which is named after its three creators: R. Rivest, A. Shamir, and L. Adleman.…”
Section: Asymmetric Encryptionmentioning
confidence: 99%
“…This algorithm was invented eight years after RSA's creation. Later, many techniques have been proposed on one or more of the previously mensioned approaches [34]- [38].  RSA: in [25], [27] the RSA encryption algorithm is an example of asymmetric cryptography, which is named after its three creators: R. Rivest, A. Shamir, and L. Adleman.…”
Section: Asymmetric Encryptionmentioning
confidence: 99%