2020 International Conference on Computer Science and Software Engineering (CSASE) 2020
DOI: 10.1109/csase48920.2020.9142072
|View full text |Cite
|
Sign up to set email alerts
|

Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(13 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…Hiding information in images through the RGB color layers has been used in several works related to steganography. Liu and Zhang [2], like Abbas et al [26] used this concept in their studies through the LSB method. The proposed algorithm uses the basis of this concept, differing in that it stores bytes directly for the RGB values of the created image(s).…”
Section: G Information By Color Layermentioning
confidence: 99%
See 1 more Smart Citation
“…Hiding information in images through the RGB color layers has been used in several works related to steganography. Liu and Zhang [2], like Abbas et al [26] used this concept in their studies through the LSB method. The proposed algorithm uses the basis of this concept, differing in that it stores bytes directly for the RGB values of the created image(s).…”
Section: G Information By Color Layermentioning
confidence: 99%
“…Table 3 lists encrypted images with the algorithm proposed in this work compared to the basic steganography algorithm, similar to that described in Abbas et al [26]. Significant differences in the weights result from the given images.…”
Section: Comparison According To the Weight Of The Imagementioning
confidence: 99%
“…While cryptography finds extensive usage in various everyday applications, both techniques have their respective domains of application and can potentially be combined for enhanced security measures. Steganography encompasses a wide range of techniques and can be applied in different forms, such as images, audio, video, and text, to many applications, for example, IoT communication [7,21,40], military [72], cloud storage [2,18,47,68], and more [28,31,32,38,90,95]. The growth of interest in steganography was sparked in two ways: the multimedia industry could greatly benefit from possible water-marking techniques, and restrictions on cryptographic schemes by governments triggered interest in alternative ways for communication to stay secretive [8].…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile we would focus more about Arabic steganography techniques in addition to how we would improve the techniques so they would be unpredicted and would be more effective to be used in. Steganography is a way to provide a communication secretly between two persons by embedding data in a digital file that could be an image, video, audio, or text as cover using a key to produce a stego-file that will make it very difficult or nearly impossible for the person in the middle to detect the stego-file and only the sender and the http://journals.uob.edu.bh receiver are able to detect and understand the file [16]. Embedding the data to make a stego-file is not a simple task and there are things to consider like size of the cover which should not be increased as much, and there are multiple features that we should consider when applying stenographic procedures: Firstly, the embedding capacity, which is how much can we change and alter the size of embedded data without affecting or changing the original quality.…”
Section: Introductionmentioning
confidence: 99%