A Novel Security Scheme based on Twofish and Discrete Wavelet Transform

Abstract

Nowadays, there is a huge amount of data exchanged between different users; the security of the exchanged data has become a significant problem due to the existing of several security attacks. So, to increase the confidence of users several security techniques can be used together to enhance the level of security. In this research paper a new secure system is proposed. The proposed system employs cryptography and steganography together. The combination between cryptography and steganography contributes in increasing the security level to provide a robust system that can resist the security attacks. In this paper, the Twofish block cipher based cryptography is employed to encrypt the data. The Twofish permits trade-offs between speed, key setup time, software size, memory, and security level. The steganographic algorithm employed to hide the encrypted data into an image is the discrete wavelet transforms (DWT) algorithm. Different security tests are used to evaluate the security and functionality of the suggested algorithm, such as, the peak signal to noise ratio (PSNR) analysis and histogram analysis. The results reveal that, the algorithm proposed in this paper is secure.

Authors and Affiliations

Mohammad S. Saraireh

Keywords

Related Articles

A Multi-Attribute Decision Making for Electrician Selection using Triangular Fuzzy Numbers Arithmetic Approach

This study uses an approach of fuzzy multi attribute decision making in determining alternatives to solve the selection problem of the electrician through a competency test. Competency test consists of several tests of k...

Video Compression by Memetic Algorithm

Memetic Algorithm by hybridization of Standard Particle Swarm Optimization and Global Local Best Particle Swarm Optimization is proposed in this paper. This technique is used to reduce number of computations of video co...

An Efficient Design of RPL Objective Function for Routing in Internet of Things using Fuzzy Logic

The nature of the Low power and lossy networks (LLNs) requires having efficient protocols capable of handling the resource constraints. LLNs consist of networks that connect different type of devices which has constraint...

Software-Defined Networks (SDNs) and Internet of Things (IoTs): A Qualitative Prediction for 2020

The Internet of Things (IoT) is imminent technology grabbing industries and research attention with a fast stride. Currently, more than 15 billion devices are connected to the Internet and this number is expected to reac...

A Students Attendance System Using QR Code

Smartphones are becoming more preferred companions to users than desktops or notebooks. Knowing that smartphones are most popular with users at the age around 26, using smartphones to speed up the process of taking atten...

Download PDF file
  • EP ID EP258803
  • DOI 10.14569/IJACSA.2017.080544
  • Views 127
  • Downloads 0

How To Cite

Mohammad S. Saraireh (2017). A Novel Security Scheme based on Twofish and Discrete Wavelet Transform. International Journal of Advanced Computer Science & Applications, 8(5), 358-364. https://europub.co.uk/articles/-A-258803