Data Security Using Cryptography and Steganography Techniques
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 6
Abstract
Although cryptography and steganography could be used to provide data security, each of them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the attacker will interrupt the transmission or make more careful checks on the data from the sender to the receiver. Steganography problem is that once the presence of hidden information is revealed or even suspected, the message is become known. According to the work in this paper, a merged technique for data security has been proposed using Cryptography and Steganography techniques to improve the security of the information. Firstly, the Advanced Encryption Standard (AES) algorithm has been modified and used to encrypt the secret message. Secondly, the encrypted message has been hidden using method in [1]. Therefore, two levels of security have been provided using the proposed hybrid technique. In addition, the proposed technique provides high embedding capacity and high quality stego images.
Authors and Affiliations
Marwa Saleh, Abdelmgeid Aly, Fatma Omara
Detection of Chronic Kidney Disease using Machine Learning Algorithms with Least Number of Predictors
Chronic kidney disease (CKD) is one of the most critical health problems due to its increasing prevalence. In this paper, we aim to test the ability of machine learning algorithms for the prediction of chronic kidney dis...
A Flexible Approach to Modelling Adaptive Course Sequencing based on Graphs implemented using XLink
A major challenge in developing systems of distance learning is the ability to adapt learning to individual users. This adaptation requires a flexible scheme for sequencing the material to teach diverse learners. This is...
Decision Support System for Agriculture Industry using Crowd Sourced Predictive Analytics
It is really tough to manually examine the raw data. The Datamining strategies are used to detect the applicable information from uncooked data. The data mining algorithms are efficient for retrieving a specific pattern....
Basic Health Screening by Exploiting Data Mining Techniques
This study aimed at proposing a basic health screening system based on data mining techniques in order to help related personnel on basic health screening and to facilitate citizens on self-examining health conditions. T...
Optimized Pessimistic Fibonacci Back-off Algorithm (PFB)
MANET is a self-directed system consisting of mobile nodes, which can be either routers and/or hosts. Nodes in MANET are connected by wireless links without base stations. The Backoff algorithm considered as a main eleme...