2019
DOI: 10.31202/ecjse.571030
|View full text |Cite
|
Sign up to set email alerts
|

The Creation of Maze in Order to Hide Data, and the Proposal of Method Based on AES Data Encryption Algorithm

Abstract: The field of science, which enables the transmission of private data in multimedia environments such as display, audio and video, is called steganography. The widespread use of the internet in our daily lives has brought about the problem of transmitting confidential information. Hence, the need for steganography science has also increased. In this study, a labyrinth is produced in the size of the environment in which the data can hide with the help of a private key. Color images with 24-bit depth were used as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…us, the significance of this research is not only that it can more conveniently and effectively manage the accounting reports of the industry, but also that the data can be further analyzed and mined. After analyzing and mining the data from all multiple angles, a more comprehensive and systematic analysis result can be obtained, which is important for obtaining the best solution [6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…us, the significance of this research is not only that it can more conveniently and effectively manage the accounting reports of the industry, but also that the data can be further analyzed and mined. After analyzing and mining the data from all multiple angles, a more comprehensive and systematic analysis result can be obtained, which is important for obtaining the best solution [6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…In another study proposed by Güvenoğlu et al, A system capable of real-time error detection on woven fabric was developed using image processing techniques. This system consists of a mechanism that provides real time woven fabric error control using the method of removing shear let conversion feature from image processing techniques on woven fabric images that are instantly recorded with a Full HD camera [21]. In the study proposed by Katırcıoğlu, it can be shown as an example of applying image processing and image enhancement studies to a different area.…”
Section: Introductionmentioning
confidence: 99%
“…The textual encryption process demands 100% exact results after decryption, whereas image decryption is acceptable with trivial distortion (Indrakanti & P.S.Avadhani, 2011). Various encryption schemes have been proposed for image encryption, [5,6] however in these schemes (fully encryption schemes) all data must be encrypted which generally takes more time, complex calculations and high memory consumption, hence these schemes are hard to use in real time applications.…”
Section: Introductionmentioning
confidence: 99%