The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2020
DOI: 10.11591/ijeecs.v17.i2.pp1053-1058
|View full text |Cite
|
Sign up to set email alerts
|

Review on secured data capabilities of cryptography, steganography, and watermarking domain

Abstract: <span>Due to the increment of using Internet to transfer the critical and secret data, many studies interested in secured data and investigated many ways to secure the transferred information. This paper presents a review study on the field that used in a secured data domain. The main objective of this study is explore the capabilities of secured data that used widely by researchers. Furthermore, the benefits and the drawbacks for each of secured data domain are also studied. This paper concludes that cr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 47 publications
0
11
0
Order By: Relevance
“…Experiments in Table 8, using samples of different numbers of strings, show that the running time required for the decryption process is longer than the encryption process. The application of the hybrid TELKOMNIKA Telecommun Comput El Control  Improvement security in e-business systems using hybrid algorithm (L Sumaryanti) 1541 algorithm requires high running time, due to the weaknesses of the RSA algorithm which has a working concept of finding the multiplication factor of two large prime numbers [36]. Another factor is the application of two types of keys simultaneously for both the encryption and decryption processes, resulting in the greater complexity of the hybrid algorithm.…”
Section: Analysis Of Experiments Resultsmentioning
confidence: 99%
“…Experiments in Table 8, using samples of different numbers of strings, show that the running time required for the decryption process is longer than the encryption process. The application of the hybrid TELKOMNIKA Telecommun Comput El Control  Improvement security in e-business systems using hybrid algorithm (L Sumaryanti) 1541 algorithm requires high running time, due to the weaknesses of the RSA algorithm which has a working concept of finding the multiplication factor of two large prime numbers [36]. Another factor is the application of two types of keys simultaneously for both the encryption and decryption processes, resulting in the greater complexity of the hybrid algorithm.…”
Section: Analysis Of Experiments Resultsmentioning
confidence: 99%
“…For example, for the chains presented in the previous paragraph, they can be assigned codes 1, 2, 3, 4, 5, and 6, respectively. The LZW technique (Lempel-Ziv-Welch) is a variant of the LZ and is one of the most commonly used in practice, in this case, a pointer is used, instead of symbol code [28].…”
Section:  Arithmetic Codingmentioning
confidence: 99%
“…A quantification process is applied to these coefficients, where generally, a significant number of the coefficients have small values that are insignificant, which can be eliminated through a process known as quantization, resulting in the loss of information, even if this does not imply appreciable distortion of the image. In this way, a small number of image data is obtained, to which a lossless coding technique is usually applied to improve the results [28]. The discrete cosine transforms (known as DCT for its acronym in English) is more frequently used for image compression, due to its ability to package information, because it packages most of the information into the smallest number of coefficients; DCT also minimizes the visibility of the boundaries between sub-images [33][34][35][36][37].…”
Section:  Transformation Codingmentioning
confidence: 99%
“…The hidden particulars to be embedded can be some words, writer ‗s serial digits, organization logo, photos containing exceptional influence. These secret details are embedded in digital information (images, audio, and video) to uphold the security, data authentication, identification of possessor and copyright defense [9][10][11][12][13]. The image that is required to be embedded is called a watermark image and the image which carries the watermark is called host or original image.…”
Section: Introductionmentioning
confidence: 99%