2018
DOI: 10.5121/ijsea.2018.9106
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Text and Image Steganography with RSA Algorithm in Cloud Computing

Abstract: time, 60.68, 40.94, 40.9, and 41.85 seconds for decryption time, 8.1, 10.92, 15.2 and 5.17 mb for memory used when hiding data, 5.3, 1.95 and 17.18 mb for memory used when extracting data, 0.93, 1.04, 1.36 and 3.76 mb for bandwidth used, 75.75, 36.2, 36.9 and 37.45

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…Cloud servers also have been introduced to image watermarking application [42]. By the cloud server a unique watermark is inserted in to the encrypted images before images are sent to user [43]. When an illegal image is found, by the watermark extraction method an unauthorized user can be outlined.…”
Section: Secure Data On Cloudmentioning
confidence: 99%
“…Cloud servers also have been introduced to image watermarking application [42]. By the cloud server a unique watermark is inserted in to the encrypted images before images are sent to user [43]. When an illegal image is found, by the watermark extraction method an unauthorized user can be outlined.…”
Section: Secure Data On Cloudmentioning
confidence: 99%