Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








386 Hits in 5.2 sec

Steganography System with Application to Crypto-Currency Cold Storage and Secure Transfer

Michael J. Pelosi, Nimesh Poudel, Pratap Lamichhane, Danyal Badar Soomro
2018 Advances in Science, Technology and Engineering Systems  
In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology.  ...  pixel; bpp).  ...  Introduction In this paper, we introduce a comprehensive steganography software system and platform framework based on One-Time Pad (OTP) encryption and adaptive steganography technology.  ... 
doi:10.25046/aj030232 fatcat:7ix3vxtehrfajiwywh6rkvsfqy

Improved LSB method for Image Steganography using H´enon Chaotic Map

N. S. Raghava, Ashish Kumar, Aishwarya Deep, Abhilasha Chahal
2014 Open Journal of Information Security and Applications  
The proposed technique has been tested successfully on various .jpg files and corresponding PSNR values have been calculated.  ...  The random numbers are used to encrypt the hide image which is embedded in the cover picture.  ...  The encryption was done using Hénon map, results in one time padding.  ... 
doi:10.15764/isa.2014.01004 fatcat:m6qdttmx6bh7rf67sx3nobikdy

A Multi-Stage Encryption Technique to Enhance the Secrecy of Image

2019 KSII Transactions on Internet and Information Systems  
The technique consecutively exploits VC, steganography and one time pad (OTP).  ...  At last, OTP encryption technique is applied on LSBs along with randomly generated OTP secret key to generate the ultimate cipher image.  ...  For this purpose, it combines VC, steganography along with one time pad (OTP). Note that OTP technique possesses 'perfect secrecy' and cannot be cracked [8] .  ... 
doi:10.3837/tiis.2019.05.025 fatcat:q2n267xgcbhbhdzdla3jzeism4

Application of Text Message Held in Image Using Combination of Least Significant Bit Method and One Time Pad

Eferoni Ndruru, Taronisokhi Zebua
2019 IJCCS (Indonesian Journal of Computing and Cybernetics Systems)  
The results of this study, hide the text message on the image (image) by using a combination of LSB and Otp methods.  ...  Stenography and security are one of the techniques to develop art in securing data.  ...  on Image Decryption Encryption with One Time Pad Method ", author," Jhoni Verlando Purba "entitled" Implementation of Text Message Steganography Into Sound Files (.Wav) By Byte Modification Distance On  ... 
doi:10.22146/ijccs.46401 fatcat:yxlgbcoj3zc2difzfqqmiyk7le

High Security of Data Using Steganography with Hybrid Algorithm

2015 International Journal of Science and Research (IJSR)  
In this paper, we will use 4 X-box technique which will hide 3 secret bit in each pixel of 24 or 32 bit cover image with hybrid algorithm i.e. AES and SHA-512.  ...  In the existing system, for hiding the data only one technique is used i.e. steganography with X-box.  ...  Based on the experimental result it was concluded that AES algorithm consumes least encryption and decryption time and buffer usage compared to DES algorithm.  ... 
doi:10.21275/v4i11.nov151226 fatcat:xmxelerwujfd5ezdwarys2y3ba

Hybrid multistage framework for data manipulation by combining cryptography and steganography

Omnia Mohammed Osman, Mohammed Eltayeb Ahmed Kanona, Mohamed Khalafalla Hassan, Afra Adil Elsir Elkhair, Khalid Sheikhidris Mohamed
2022 Bulletin of Electrical Engineering and Informatics  
In this hybrid multi-stage data encryption architecture, which builds sequential and pseudo-random encoding/decoding algorithms with pre-stage text encryption discovered that image resolution and attributes  ...  Furthermore, when compared to sequential encoding/decoding, the hybrid cryptography and steganography-pseudo-random encoding/decoding procedure is more efficient and time consuming.  ...  Stream cipher encryption stage The one-time pad (OTP) was used to encrypt the message taking the advantage of one-time pre-shared key which generated with the same message size.  ... 
doi:10.11591/eei.v11i1.3451 fatcat:qturigms7zbmzluo5nc74mncfi

A Secure Block Permutation Image Steganography Algorithm

Hussein Al-Bahadili
2013 International Journal on Cryptography and Information Security  
Therefore, it is necessary to develop more secure steganography algorithms. This paper presents a detailed description of a new secure Block Permutation Image Steganography (BPIS) algorithm.  ...  The algorithm converts the secret message to a binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly generated permutation, concatenates the permuted blocks  ...  It is based on replacing one or more of the LSBs of the image pixels with bits from the secret message (usually not more than 4 bits).  ... 
doi:10.5121/ijcis.2013.3302 fatcat:kdxjaczspvb7dptwqrzj26jzrm

Base64, End of File and One Time Pad for Improvement Steganography Security

R Rahim, R Ratnadewi, D Prayama, E Asri, D Satria
2018 IOP Conference Series: Materials Science and Engineering  
End of File (EOF) were one of steganography method that widely used because it easily implemented in any media, combination of Base64 algorithm and One Time Pad as encoding and encryption process on data  ...  or object before embedded process using EOF method will produce a strong ciphertext that is good because one time pad using dynamic key as length message, ciphertext will be embedded in bytecode using  ...  The message security that is hidden with the One Time Pad algorithm depends on the One Time Pad key which is randomly mathematically so that the key used will not be possible with the same message.  ... 
doi:10.1088/1757-899x/407/1/012161 fatcat:ie6y5ljv3ngc3iaype53qmihvq

File Encryption and Hiding Application Based on AES and Append Insertion Steganography

Gottfried Prasetyadi, Rina Refianti, Achmad Benny Mutiara
2018 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
To scramble the meaning of the hidden message, AES-256 (Rijndael algorithm) is used to encrypt the message with a secret passphrase.  ...  In the testing, they all retain their integrity, proven by exact hash values.  ...  Based on the result, obviously, the bigger the message file, the longer the encryption and hiding time.  ... 
doi:10.12928/telkomnika.v16i1.6409 fatcat:c2podydmjvekpfg3grabvqgoge

High-End Secure Image Transfer using Vector Quantization

B N V L S Kashyap, Velagapudi Ramakrishna Siddhartha Engineering College
2020 International Journal of Engineering Research and  
A system is manifested through Data Hiding algorithms based on signal processing techniques like vector quantization.  ...  Thus, the original image is successfully encrypted and stegonized into the host image.  ...  The grayscale value in the range of 155 and 254 with the observation of complete image is for the pixels and based on the highest pixel value of the histogram it is shifted right.  ... 
doi:10.17577/ijertv9is060826 fatcat:cun6vl2v7bambglb5pq7lfui54

Protecting Information with Subcodstanography

Mirko Köhler, Ivica Lukić, Višnja Križanović Čik
2017 Security and Communication Networks  
Each encryption algorithm can be decrypted within sufficient time and with sufficient resources.  ...  Many encryption algorithms have been developed for protection of confidential information. However, over time, flaws have been discovered even with the most sophisticated encryption algorithms.  ...  The only exception is the "one time pad" algorithm which uses a temporary card or pad that is immediately destroyed after its use.  ... 
doi:10.1155/2017/9130683 fatcat:cq5jmjhcwnbdpltftdy3gi7bb4

High Complexity Bit-Plane Security Enchancement in BPCS Steganography

Andysah Putera
2016 International Journal of Computer Applications  
Finally, the data residing on the cover image produced have a high-security level.  ...  Bit-plane will be combined with a specified key. The key should be changed to bit-plane form as well. The key that has already been turned into the bit-plane will be mated with the original data.  ...  This research aims to combine the steganography and cryptography. One Time Pad is a symmetric key cryptography technique that has the same formula for encryption and decryption.  ... 
doi:10.5120/ijca2016911069 fatcat:mhdyfaahlfhivlrf6y5ntx6h7q

HIGH SECURED DATA HIDING USING QR CODE ENCRYPTION AND STEGANOGRAPHY

MuhamedJasim TK, Pinky Mohan
2017 International Journal of Advanced Research  
In the suggested method include two phase: (1) Encrypting the text message by a QR code encoder and creating a QR code, (2) Hiding the secret image inside the generated QR code.This proposed approach has  ...  In steganography, Steganography hides the data in a medium such as text file, image, audio, video etc., and restrain the very existence of the message in the medium from a third party .In this paper it  ...  For the one-time pad system the key must be at least as long as the message. In encryption systems that use a cipher algorithm, messages can be much longer than the key.  ... 
doi:10.21474/ijar01/4130 fatcat:7kwtwmyl5jgbxd363rrkpzf4yy

Performance Evaluation of Steganography and AES encryption based on different formats of the Image

Farhan R. Patel, Dr. Cheeran A. N
2015 IJARCCE  
Advanced Encryption Standard (AES) is performed on to the stego image.  ...  Steganography and Cryptography are two different data hiding techniques.  ...  We observe that on performing both LSB steganography and AES encryption on different formats of the image, the delay of the process increases.  ... 
doi:10.17148/ijarcce.2015.45140 fatcat:zet6nqoiybf7nflz6ctlyidiqu

E-Commerce with the Security Techniques of Visual Cryptography and Text Based Steganography

V Sangeetha
2018 Zenodo  
Visual Cryptography is a cryptographic technique based on visual secret sharing, secret image or text is encrypted in shares which are meaningless images that can be transmitted or distributed over an  ...  Here secure online transaction using textbased steganography and visual cryptography is used for E-Commerce but we can also use it for online and physical baking system with enhanced techniques.  ...  One Time Image extends the principle of those images. First, the source image is converted to black and white, not gray scale, true black and white with pixels of only these two different colors.  ... 
doi:10.5281/zenodo.1411012 fatcat:px4dunlsqbaufpmlmky3ivnvcy
« Previous Showing results 1 — 15 out of 386 results