Data Security Using Cryptography and Steganography Techniques
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 6
Abstract
Although cryptography and steganography could be used to provide data security, each of them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the attacker will interrupt the transmission or make more careful checks on the data from the sender to the receiver. Steganography problem is that once the presence of hidden information is revealed or even suspected, the message is become known. According to the work in this paper, a merged technique for data security has been proposed using Cryptography and Steganography techniques to improve the security of the information. Firstly, the Advanced Encryption Standard (AES) algorithm has been modified and used to encrypt the secret message. Secondly, the encrypted message has been hidden using method in [1]. Therefore, two levels of security have been provided using the proposed hybrid technique. In addition, the proposed technique provides high embedding capacity and high quality stego images.
Authors and Affiliations
Marwa Saleh, Abdelmgeid Aly, Fatma Omara
A Review On Cognitive Mismatch Between Computer and Information Technology And Physicians
Health Information Technology has a great potential to transform the existing health care systems by making them safe, effective and efficient. Multi-functionality and interoperability of health information systems are v...
Model of Temperature Dependence Shape of Ytterbium -doped Fiber Amplifier Operating at 915 nm Pumping Configuration
We numerically analyze the temperature dependence of an ytterbium-doped fiber amplifier (YDFA) operating at 915 nm, investigating its gain and Noise Figure properties variation with temperature. The temperature-dependent...
TokenVote: Secured Electronic Voting System in the Cloud
With the spread of democracy around the world, voting is considered a way to collectively make decisions. Recently, many government offices and private organizations use voting to make decisions when the opinions of mult...
Evaluating Usability of E-Learning Systems in Universities
The use of e-learning systems has increased significantly in the recent times. E-learning systems are supplementing teaching and learning in universities globally. Kenyan universities have adopted e-learning technologies...
Mitigation of Cascading Failures with Link Weight Control
Cascading failures are crucial issues for the study of survivability and resilience of our infrastructures and have attracted much interest in complex networks research. In this paper, we study the overload-based cascadi...