A Novel Security Scheme based on Twofish and Discrete Wavelet Transform
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 5
Abstract
Nowadays, there is a huge amount of data exchanged between different users; the security of the exchanged data has become a significant problem due to the existing of several security attacks. So, to increase the confidence of users several security techniques can be used together to enhance the level of security. In this research paper a new secure system is proposed. The proposed system employs cryptography and steganography together. The combination between cryptography and steganography contributes in increasing the security level to provide a robust system that can resist the security attacks. In this paper, the Twofish block cipher based cryptography is employed to encrypt the data. The Twofish permits trade-offs between speed, key setup time, software size, memory, and security level. The steganographic algorithm employed to hide the encrypted data into an image is the discrete wavelet transforms (DWT) algorithm. Different security tests are used to evaluate the security and functionality of the suggested algorithm, such as, the peak signal to noise ratio (PSNR) analysis and histogram analysis. The results reveal that, the algorithm proposed in this paper is secure.
Authors and Affiliations
Mohammad S. Saraireh
Comprehensive Study and Comparison of Information Retrieval Indexing Techniques
This research is aimed at comparing techniques of indexing that exist in the current information retrieval processes. The techniques being inverted files, suffix trees, and signature files will be critically described an...
Automating the Collection of Object Relational Database Metrics
The quality of software systems is the most important factor to consider when designing and using these systems. The quality of the database or the database management system is particularly important as it is the backbo...
Throughput Measurement Method Using Command Packets for Mobile Robot Teleoperation Via a Wireless Sensor Network
We are working to develop an information gathering system comprising a mobile robot and a wireless sensor network (WSN) for use in post-disaster underground environments. In the proposed system, a mobile robot carries wi...
Detection and Identification System of Bacteria and Bacterial Endotoxin Based on Raman Spectroscopy
Sepsis is a global health problem that causes risk of death. In the developing world, about 60 to 80 % of death cases are caused by Sepsis. Rapid methods for detecting its causes, represent one of the major factors that...
Improvement of Brain Tissue Segmentation Using Information Fusion Approach
The fusion of information is a domain of research in full effervescence these last years. Because of increasing of the diversity techniques of images acquisitions, the applications of medical images segmentation, in whic...