2016
DOI: 10.14569/ijacsa.2016.070733
|View full text |Cite
|
Sign up to set email alerts
|

Improvisation of Security aspect of Steganographic System by applying RSA Algorithm

Abstract: Abstract-The applications accessing multimedia systems and content over the internet have grown extremely in the earlier few years. Moreover, several end users or intruders can simply use tools to synthesize and modify valuable information. The safety of information over unsafe communication channel has constantly been a primary concern in the consideration of researchers. It became one of the most important problems for information technology and essential to safeguard this valuable information during transmi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 11 publications
0
1
0
Order By: Relevance
“…c. The platform layer: to reduce the deployment burden directly on virtual machines, the platform layer consists of software frameworks and operating systems. d. The application layer: this layer is constructed on top of the actual cloud applications [53]. Examples include Google Maps, YouTube, and Facebook.…”
Section: Cloud Computing Architecturementioning
confidence: 99%
“…c. The platform layer: to reduce the deployment burden directly on virtual machines, the platform layer consists of software frameworks and operating systems. d. The application layer: this layer is constructed on top of the actual cloud applications [53]. Examples include Google Maps, YouTube, and Facebook.…”
Section: Cloud Computing Architecturementioning
confidence: 99%
“…However, confidential image files in a storage medium (hard disks and memory cards) and image files transmitted on a network may cause eavesdropping, modification, or fabrication by certain third parties (crackers). The purpose of the cracker is to find out crucial information hidden in an image, or the cracker wants to break into confidential data behind the characteristics possessed by the image file [1]- [4].…”
Section: Introductionmentioning
confidence: 99%
“…Cryptography can be divided into symmetric key cryptography and asymmetric key cryptography. In symmetric key cryptography, the key for the encryption process is the same as the key for the decryption process [1], [7], [8]. So, in this case, the sender and recipient of the message have already shared the key before exchanging messages with each other.…”
Section: Introductionmentioning
confidence: 99%