A Novel Security Scheme based on Twofish and Discrete Wavelet Transform

Abstract

Nowadays, there is a huge amount of data exchanged between different users; the security of the exchanged data has become a significant problem due to the existing of several security attacks. So, to increase the confidence of users several security techniques can be used together to enhance the level of security. In this research paper a new secure system is proposed. The proposed system employs cryptography and steganography together. The combination between cryptography and steganography contributes in increasing the security level to provide a robust system that can resist the security attacks. In this paper, the Twofish block cipher based cryptography is employed to encrypt the data. The Twofish permits trade-offs between speed, key setup time, software size, memory, and security level. The steganographic algorithm employed to hide the encrypted data into an image is the discrete wavelet transforms (DWT) algorithm. Different security tests are used to evaluate the security and functionality of the suggested algorithm, such as, the peak signal to noise ratio (PSNR) analysis and histogram analysis. The results reveal that, the algorithm proposed in this paper is secure.

Authors and Affiliations

Mohammad S. Saraireh

Keywords

Related Articles

Brain-Controlled for Changing Modular Robot Configuration by Employing Neurosky’s Headset

Currently, the Brain Computer Interfaces (BCI) system was designed mostly to be implemented for control purpose or navigation which are mostly being employed for mobile robot, manipulator robot and humanoid robot by usin...

Software Requirements Conflict Identification: Review and Recommendations

Successful development of software systems re-quires a set of complete, consistent and clear requirements. A wide range of different stakeholders with various needs and backgrounds participate in the requirements enginee...

Improvement of Radial basis Function Interpolation Performance on Cranial Implant Design

Cranioplasty is a neurosurgical operation for repairing cranial defects that have occurred in a previous operation or trauma. Various methods have been presented for cranioplasty from past to present. In computer-aided d...

FFD Variants for Virtual Machine Placement in Cloud Computing Data Centers

Virtualization technology is used to efficiently utilize the resources of a Cloud datacenter by running multiple virtual machines (VMs) on a single physical machine (PM) as if each VM is a standalone PM. Efficient placem...

Design of Wearable Patch Antenna for Wireless Body Area Networks

Wireless body area networks are being widely used due to the increase in the use of wireless networks and various electrical devices. A Wearable Patch antenna is used for enhancement of various applications for WBAN. In...

Download PDF file
  • EP ID EP258803
  • DOI 10.14569/IJACSA.2017.080544
  • Views 103
  • Downloads 0

How To Cite

Mohammad S. Saraireh (2017). A Novel Security Scheme based on Twofish and Discrete Wavelet Transform. International Journal of Advanced Computer Science & Applications, 8(5), 358-364. https://europub.co.uk/articles/-A-258803