2022
DOI: 10.21123/bsj.2022.6142
|View full text |Cite
|
Sign up to set email alerts
|

Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel

Abstract: Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 11 publications
(11 reference statements)
0
6
0
Order By: Relevance
“…The statistical analysis of visual characteristics and the temporal analysis of motion information have been suggested as robust methodologies. Color and texture may be used to segment a frame into many sections, which can then be combined based on motion vectors that are comparable to each other 8 . This is a usual method, and it can be used to a wide range of images.…”
Section: Object Detectionmentioning
confidence: 99%
“…The statistical analysis of visual characteristics and the temporal analysis of motion information have been suggested as robust methodologies. Color and texture may be used to segment a frame into many sections, which can then be combined based on motion vectors that are comparable to each other 8 . This is a usual method, and it can be used to a wide range of images.…”
Section: Object Detectionmentioning
confidence: 99%
“…The test requires a count of the number of repeated patterns, however, it does not require the frequency of each pattern. Naser [7] proposed an extension to the binary standard randomness tests that are suitable to be applied on penta-sequences (𝐺𝐹(5)), and he applied the extended randomness to the output of an example of the digital penta-sequences. Ibraheem [8] attempted to extend the 2-tuple to d-tuple (𝑑 ≥ 3) for the serial test, then we will generalize the 2-tuple binary serial test to 2-tuple digital serial test for the digital (𝑠 −) sequences (𝑠 ≥ 3) that are generated from digital generators.…”
Section: Introductionmentioning
confidence: 99%
“…Methods of protecting information varied between encryption and steganography. Encryption is the conversion of confidential data into an unreadable format [1] which is a sprinkling of letters that do not give any meaning only those who possess the encryption keys can decipher the text and return it to an understandable format [2].…”
Section: Introductionmentioning
confidence: 99%