A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Steganography System with Application to Crypto-Currency Cold Storage and Secure Transfer
2018
Advances in Science, Technology and Engineering Systems
In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology. ...
pixel; bpp). ...
Introduction In this paper, we introduce a comprehensive steganography software system and platform framework based on One-Time Pad (OTP) encryption and adaptive steganography technology. ...
doi:10.25046/aj030232
fatcat:7ix3vxtehrfajiwywh6rkvsfqy
Improved LSB method for Image Steganography using H´enon Chaotic Map
2014
Open Journal of Information Security and Applications
The proposed technique has been tested successfully on various .jpg files and corresponding PSNR values have been calculated. ...
The random numbers are used to encrypt the hide image which is embedded in the cover picture. ...
The encryption was done using Hénon map, results in one time padding. ...
doi:10.15764/isa.2014.01004
fatcat:m6qdttmx6bh7rf67sx3nobikdy
A Multi-Stage Encryption Technique to Enhance the Secrecy of Image
2019
KSII Transactions on Internet and Information Systems
The technique consecutively exploits VC, steganography and one time pad (OTP). ...
At last, OTP encryption technique is applied on LSBs along with randomly generated OTP secret key to generate the ultimate cipher image. ...
For this purpose, it combines VC, steganography along with one time pad (OTP). Note that OTP technique possesses 'perfect secrecy' and cannot be cracked [8] . ...
doi:10.3837/tiis.2019.05.025
fatcat:q2n267xgcbhbhdzdla3jzeism4
Application of Text Message Held in Image Using Combination of Least Significant Bit Method and One Time Pad
2019
IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
The results of this study, hide the text message on the image (image) by using a combination of LSB and Otp methods. ...
Stenography and security are one of the techniques to develop art in securing data. ...
on Image Decryption Encryption with One Time Pad Method ", author," Jhoni Verlando Purba "entitled" Implementation of Text Message Steganography Into Sound Files (.Wav) By Byte Modification Distance On ...
doi:10.22146/ijccs.46401
fatcat:yxlgbcoj3zc2difzfqqmiyk7le
High Security of Data Using Steganography with Hybrid Algorithm
2015
International Journal of Science and Research (IJSR)
In this paper, we will use 4 X-box technique which will hide 3 secret bit in each pixel of 24 or 32 bit cover image with hybrid algorithm i.e. AES and SHA-512. ...
In the existing system, for hiding the data only one technique is used i.e. steganography with X-box. ...
Based on the experimental result it was concluded that AES algorithm consumes least encryption and decryption time and buffer usage compared to DES algorithm. ...
doi:10.21275/v4i11.nov151226
fatcat:xmxelerwujfd5ezdwarys2y3ba
Hybrid multistage framework for data manipulation by combining cryptography and steganography
2022
Bulletin of Electrical Engineering and Informatics
In this hybrid multi-stage data encryption architecture, which builds sequential and pseudo-random encoding/decoding algorithms with pre-stage text encryption discovered that image resolution and attributes ...
Furthermore, when compared to sequential encoding/decoding, the hybrid cryptography and steganography-pseudo-random encoding/decoding procedure is more efficient and time consuming. ...
Stream cipher encryption stage The one-time pad (OTP) was used to encrypt the message taking the advantage of one-time pre-shared key which generated with the same message size. ...
doi:10.11591/eei.v11i1.3451
fatcat:qturigms7zbmzluo5nc74mncfi
A Secure Block Permutation Image Steganography Algorithm
2013
International Journal on Cryptography and Information Security
Therefore, it is necessary to develop more secure steganography algorithms. This paper presents a detailed description of a new secure Block Permutation Image Steganography (BPIS) algorithm. ...
The algorithm converts the secret message to a binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly generated permutation, concatenates the permuted blocks ...
It is based on replacing one or more of the LSBs of the image pixels with bits from the secret message (usually not more than 4 bits). ...
doi:10.5121/ijcis.2013.3302
fatcat:kdxjaczspvb7dptwqrzj26jzrm
Base64, End of File and One Time Pad for Improvement Steganography Security
2018
IOP Conference Series: Materials Science and Engineering
End of File (EOF) were one of steganography method that widely used because it easily implemented in any media, combination of Base64 algorithm and One Time Pad as encoding and encryption process on data ...
or object before embedded process using EOF method will produce a strong ciphertext that is good because one time pad using dynamic key as length message, ciphertext will be embedded in bytecode using ...
The message security that is hidden with the One Time Pad algorithm depends on the One Time Pad key which is randomly mathematically so that the key used will not be possible with the same message. ...
doi:10.1088/1757-899x/407/1/012161
fatcat:ie6y5ljv3ngc3iaype53qmihvq
File Encryption and Hiding Application Based on AES and Append Insertion Steganography
2018
TELKOMNIKA (Telecommunication Computing Electronics and Control)
To scramble the meaning of the hidden message, AES-256 (Rijndael algorithm) is used to encrypt the message with a secret passphrase. ...
In the testing, they all retain their integrity, proven by exact hash values. ...
Based on the result, obviously, the bigger the message file, the longer the encryption and hiding time. ...
doi:10.12928/telkomnika.v16i1.6409
fatcat:c2podydmjvekpfg3grabvqgoge
High-End Secure Image Transfer using Vector Quantization
2020
International Journal of Engineering Research and
A system is manifested through Data Hiding algorithms based on signal processing techniques like vector quantization. ...
Thus, the original image is successfully encrypted and stegonized into the host image. ...
The grayscale value in the range of 155 and 254 with the observation of complete image is for the pixels and based on the highest pixel value of the histogram it is shifted right. ...
doi:10.17577/ijertv9is060826
fatcat:cun6vl2v7bambglb5pq7lfui54
Protecting Information with Subcodstanography
2017
Security and Communication Networks
Each encryption algorithm can be decrypted within sufficient time and with sufficient resources. ...
Many encryption algorithms have been developed for protection of confidential information. However, over time, flaws have been discovered even with the most sophisticated encryption algorithms. ...
The only exception is the "one time pad" algorithm which uses a temporary card or pad that is immediately destroyed after its use. ...
doi:10.1155/2017/9130683
fatcat:cq5jmjhcwnbdpltftdy3gi7bb4
High Complexity Bit-Plane Security Enchancement in BPCS Steganography
2016
International Journal of Computer Applications
Finally, the data residing on the cover image produced have a high-security level. ...
Bit-plane will be combined with a specified key. The key should be changed to bit-plane form as well. The key that has already been turned into the bit-plane will be mated with the original data. ...
This research aims to combine the steganography and cryptography. One Time Pad is a symmetric key cryptography technique that has the same formula for encryption and decryption. ...
doi:10.5120/ijca2016911069
fatcat:mhdyfaahlfhivlrf6y5ntx6h7q
HIGH SECURED DATA HIDING USING QR CODE ENCRYPTION AND STEGANOGRAPHY
2017
International Journal of Advanced Research
In the suggested method include two phase: (1) Encrypting the text message by a QR code encoder and creating a QR code, (2) Hiding the secret image inside the generated QR code.This proposed approach has ...
In steganography, Steganography hides the data in a medium such as text file, image, audio, video etc., and restrain the very existence of the message in the medium from a third party .In this paper it ...
For the one-time pad system the key must be at least as long as the message. In encryption systems that use a cipher algorithm, messages can be much longer than the key. ...
doi:10.21474/ijar01/4130
fatcat:7kwtwmyl5jgbxd363rrkpzf4yy
Performance Evaluation of Steganography and AES encryption based on different formats of the Image
2015
IJARCCE
Advanced Encryption Standard (AES) is performed on to the stego image. ...
Steganography and Cryptography are two different data hiding techniques. ...
We observe that on performing both LSB steganography and AES encryption on different formats of the image, the delay of the process increases. ...
doi:10.17148/ijarcce.2015.45140
fatcat:zet6nqoiybf7nflz6ctlyidiqu
E-Commerce with the Security Techniques of Visual Cryptography and Text Based Steganography
2018
Zenodo
Visual Cryptography is a cryptographic technique based on visual secret sharing, secret image or text is encrypted in shares which are meaningless images that can be transmitted or distributed over an ...
Here secure online transaction using textbased steganography and visual cryptography is used for E-Commerce but we can also use it for online and physical baking system with enhanced techniques. ...
One Time Image extends the principle of those images. First, the source image is converted to black and white, not gray scale, true black and white with pixels of only these two different colors. ...
doi:10.5281/zenodo.1411012
fatcat:px4dunlsqbaufpmlmky3ivnvcy
« Previous
Showing results 1 — 15 out of 386 results