2022
DOI: 10.21123/bsj.2022.19.1.0189
|View full text |Cite
|
Sign up to set email alerts
|

Securing Text Messages Using Graph Theory and Steganography

Abstract: Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Hence, after deleting 𝑒 1 and 𝑒 2 from 𝐺𝑃(𝑛, 1), we get the graph in Figure (2). Next, 𝑑 presents the diameter of the connected graphs 𝐺𝑝(𝑛, 1,2) obtained upon removing 𝑡 = 2 edges from 𝐺𝑝(𝑛, 1).…”
Section: Case 1: 𝒕 =mentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, after deleting 𝑒 1 and 𝑒 2 from 𝐺𝑃(𝑛, 1), we get the graph in Figure (2). Next, 𝑑 presents the diameter of the connected graphs 𝐺𝑝(𝑛, 1,2) obtained upon removing 𝑡 = 2 edges from 𝐺𝑝(𝑛, 1).…”
Section: Case 1: 𝒕 =mentioning
confidence: 99%
“…Systems for data transmission and communication must include data security. Its primary responsibility is to safeguard and integrate sensitive data from the source to the recipient [2].…”
Section: Introductionmentioning
confidence: 99%
“…To evaluate the recovery capability of the proposed system, the normalized mean square error (MSE) and peak signal-to-noise ratio metrics (PSNR) parameters were used [33]. These parameters were computed between the original and reconstructed signals, given by:…”
Section: Psnr and Mse Analysismentioning
confidence: 99%
“…Numerous studies have been conducted on various families of graphs using various fortunate labelling techniques, including Lucky Edge Lableing 3,4 , Proper Lucky Labeling 5 , e Lucky Labeling 6 , d-Lucky Labeling 7 , Proper d-Lucky Labeling 8 etc. This paper aims to find the lucky number of prominent families [9][10][11] namely Complete graphs and Complete Bipartite graphs.…”
Section: Introductionmentioning
confidence: 99%