A Novel Security Scheme based on Twofish and Discrete Wavelet Transform
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 5
Abstract
Nowadays, there is a huge amount of data exchanged between different users; the security of the exchanged data has become a significant problem due to the existing of several security attacks. So, to increase the confidence of users several security techniques can be used together to enhance the level of security. In this research paper a new secure system is proposed. The proposed system employs cryptography and steganography together. The combination between cryptography and steganography contributes in increasing the security level to provide a robust system that can resist the security attacks. In this paper, the Twofish block cipher based cryptography is employed to encrypt the data. The Twofish permits trade-offs between speed, key setup time, software size, memory, and security level. The steganographic algorithm employed to hide the encrypted data into an image is the discrete wavelet transforms (DWT) algorithm. Different security tests are used to evaluate the security and functionality of the suggested algorithm, such as, the peak signal to noise ratio (PSNR) analysis and histogram analysis. The results reveal that, the algorithm proposed in this paper is secure.
Authors and Affiliations
Mohammad S. Saraireh
Brain-Controlled for Changing Modular Robot Configuration by Employing Neurosky’s Headset
Currently, the Brain Computer Interfaces (BCI) system was designed mostly to be implemented for control purpose or navigation which are mostly being employed for mobile robot, manipulator robot and humanoid robot by usin...
Software Requirements Conflict Identification: Review and Recommendations
Successful development of software systems re-quires a set of complete, consistent and clear requirements. A wide range of different stakeholders with various needs and backgrounds participate in the requirements enginee...
Improvement of Radial basis Function Interpolation Performance on Cranial Implant Design
Cranioplasty is a neurosurgical operation for repairing cranial defects that have occurred in a previous operation or trauma. Various methods have been presented for cranioplasty from past to present. In computer-aided d...
FFD Variants for Virtual Machine Placement in Cloud Computing Data Centers
Virtualization technology is used to efficiently utilize the resources of a Cloud datacenter by running multiple virtual machines (VMs) on a single physical machine (PM) as if each VM is a standalone PM. Efficient placem...
Design of Wearable Patch Antenna for Wireless Body Area Networks
Wireless body area networks are being widely used due to the increase in the use of wireless networks and various electrical devices. A Wearable Patch antenna is used for enhancement of various applications for WBAN. In...