A Novel Security Scheme based on Twofish and Discrete Wavelet Transform
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 5
Abstract
Nowadays, there is a huge amount of data exchanged between different users; the security of the exchanged data has become a significant problem due to the existing of several security attacks. So, to increase the confidence of users several security techniques can be used together to enhance the level of security. In this research paper a new secure system is proposed. The proposed system employs cryptography and steganography together. The combination between cryptography and steganography contributes in increasing the security level to provide a robust system that can resist the security attacks. In this paper, the Twofish block cipher based cryptography is employed to encrypt the data. The Twofish permits trade-offs between speed, key setup time, software size, memory, and security level. The steganographic algorithm employed to hide the encrypted data into an image is the discrete wavelet transforms (DWT) algorithm. Different security tests are used to evaluate the security and functionality of the suggested algorithm, such as, the peak signal to noise ratio (PSNR) analysis and histogram analysis. The results reveal that, the algorithm proposed in this paper is secure.
Authors and Affiliations
Mohammad S. Saraireh
A Multi-Attribute Decision Making for Electrician Selection using Triangular Fuzzy Numbers Arithmetic Approach
This study uses an approach of fuzzy multi attribute decision making in determining alternatives to solve the selection problem of the electrician through a competency test. Competency test consists of several tests of k...
Video Compression by Memetic Algorithm
Memetic Algorithm by hybridization of Standard Particle Swarm Optimization and Global Local Best Particle Swarm Optimization is proposed in this paper. This technique is used to reduce number of computations of video co...
An Efficient Design of RPL Objective Function for Routing in Internet of Things using Fuzzy Logic
The nature of the Low power and lossy networks (LLNs) requires having efficient protocols capable of handling the resource constraints. LLNs consist of networks that connect different type of devices which has constraint...
Software-Defined Networks (SDNs) and Internet of Things (IoTs): A Qualitative Prediction for 2020
The Internet of Things (IoT) is imminent technology grabbing industries and research attention with a fast stride. Currently, more than 15 billion devices are connected to the Internet and this number is expected to reac...
A Students Attendance System Using QR Code
Smartphones are becoming more preferred companions to users than desktops or notebooks. Knowing that smartphones are most popular with users at the age around 26, using smartphones to speed up the process of taking atten...