2019
DOI: 10.1007/s12046-019-1106-0
|View full text |Cite
|
Sign up to set email alerts
|

Dual-layer security of image steganography based on IDEA and LSBG algorithm in the cloud environment

Abstract: The architecture development of cloud computing technology is growing tremendously in recent times, which leads to improvement of scalability, accessibility and cost reduction measures in the IT sectors of all enterprises. In this service, the data storage without reviewing security policies and procedures is a challenging task and probabilities of extracting secret information by an unauthorized intervention are more. However, to prevent the breaches of security in the cloud service, the steganography art pla… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…The reviewed techniques works on different types of images where [18] and [20] suitable for a grayscale image, [21] works on black and white or grayscale images and some suitable for color image such as [1], [19] and [22].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The reviewed techniques works on different types of images where [18] and [20] suitable for a grayscale image, [21] works on black and white or grayscale images and some suitable for color image such as [1], [19] and [22].…”
Section: Discussionmentioning
confidence: 99%
“…IDEA uses large number of weak keys. [19] Yes No No [20] Yes Yes No [21] Yes Yes No [22] Yes Yes Yes recently proposed techniques for cloud data security using image steganography. We compared these techniques based on algorithms they used, advantages and drawbacks, and based on the objectives of steganography.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The problem is of general interest and great significance because it affects many people on an individual and business or organizational level, cutting across many industries, especially in the IT industry and academia [18]. In this paper, the stakeholders affected by the security and privacy breaches on cloud computing data include the organizations that employ cloud computing services, customers or clients of those organizations, employees, individuals, IT systems administrators, and third-party cloud service providers.…”
Section: Research Problemmentioning
confidence: 99%
“…With the rapid development of computer network technology and communication technology, more and more digital images need to be processed, transmitted, and stored in complex and changeable network environment. The security of image information has become increasingly important 1 . In many applications, digital image information is often closely related to personal privacy, trade secrets and military intelligence, and even national security.…”
Section: Introductionmentioning
confidence: 99%