2022
DOI: 10.11591/ijece.v12i6.pp6574-6584
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid information security system via combination of compression, cryptography, and image steganography

Abstract: <span lang="EN-US">Today, the world is experiencing a new paradigm characterized by dynamism and rapid change due to revolutions that have gone through information and digital communication technologies, this raised many security and capacity concerns about information security transmitted via the Internet network. Cryptography and steganography are two of the most extensively that are used to ensure information security. Those techniques alone are not suitable for high security of information, so in thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…It is essential to understand the two primary types of cryptographic keys: symmetric keys and asymmetric keys [16]- [20]. Symmetric key encryption involves generating one private key, which is then shared between two authorized individuals.…”
Section: Cryptography Keymentioning
confidence: 99%
See 2 more Smart Citations
“…It is essential to understand the two primary types of cryptographic keys: symmetric keys and asymmetric keys [16]- [20]. Symmetric key encryption involves generating one private key, which is then shared between two authorized individuals.…”
Section: Cryptography Keymentioning
confidence: 99%
“…Without the private key, no one else can view the message's content. Using the same private key, the intended recipient can decrypt the message and restore it to its original format [16], [18], [20]- [24]. Examples of symmetric keys include advanced encryption standards (AES), blowfish (BF), and data encryption standards (DES).…”
Section: Cryptography Keymentioning
confidence: 99%
See 1 more Smart Citation
“…This innovation addresses a fundamental challenge in cryptography: ensuring the secure generation, storage, and distribution of shared session keys. This progress significantly bolsters data security, enabling servers to receive encrypted data, process it, and return encrypted results, all while maintaining open data and encryption keys within a secure segment during network interactions [5]- [8]. For instance, consider a scenario where a hospital holds a substantial amount of private and sensitive patient information; it can homomorphically encrypt the data and transmit it to a third party for analysis.…”
Section: Introductionmentioning
confidence: 99%
“…The security and capacity issue might be resolved in part thanks to this study. [14], [15][16] , [17], We've seen that error-correcting codes and steganographic methods have a close relationship. He introduced a new steganography that combines LSB and a new error-correcting code with Rijndael phonetic steganography.…”
mentioning
confidence: 99%