Stego-Based-Crypto Algorithm for High Security Applications
(Sprache: Englisch)
Since the rise of internet and data transmission via public media, the security of information has become an important issue especially for the confidential data. Unfortunately; it is not enough sometimes to keep the contents of message secret, it may be...
Leider schon ausverkauft
versandkostenfrei
Buch
49.90 €
Produktdetails
Produktinformationen zu „Stego-Based-Crypto Algorithm for High Security Applications “
Klappentext zu „Stego-Based-Crypto Algorithm for High Security Applications “
Since the rise of internet and data transmission via public media, the security of information has become an important issue especially for the confidential data. Unfortunately; it is not enough sometimes to keep the contents of message secret, it may be also necessary to keep the existence of message secret. So cryptography and steganography can be combined to get this purpose. In this work, crypto-stego algorithm is proposed; which is based on both cryptography and steganography techniques. The proposed algorithm used Rivest- Shamir-Adleman (RSA) as a cryptographic algorithm to encrypt the secret message before hiding it in order to increase the security of the system. In addition, Integer Wavelet Transform (IWT) technique is utilized to embed the encrypted message in the frequency coefficients of the sub-bands. Finally, the proposed techniques obtained good results through satisfying and improving the most important properties of steganography such as: imperceptibility, security, and capacity.
Bibliographische Angaben
- Autor: Wafaa M. Abduallah
- 2017, 108 Seiten, Maße: 22 cm, Kartoniert (TB), Englisch
- Verlag: Noor Publishing
- ISBN-10: 6202340568
- ISBN-13: 9786202340564
Sprache:
Englisch
Kommentar zu "Stego-Based-Crypto Algorithm for High Security Applications"
0 Gebrauchte Artikel zu „Stego-Based-Crypto Algorithm for High Security Applications“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Stego-Based-Crypto Algorithm for High Security Applications".
Kommentar verfassen