期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Review of Image Steganography Based on Multiple Hashing Algorithm 被引量:1
1
作者 Abdullah Alenizi Mohammad Sajid Mohammadi +1 位作者 Ahmad A.Al-Hajji Arshiya Sajid Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第8期2463-2494,共32页
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s... Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms. 展开更多
关键词 Image steganography multiple hashing algorithms Hash-LSB approach RSA algorithm discrete cosine transform(DCT)algorithm blowfish algorithm
在线阅读 下载PDF
Cloud-based data security transactions employing blowfish and spotted hyena optimisation algorithm
2
作者 Ch.Chakradhara Rao Tryambak Hiwarkar B.Santhosh Kumar 《Journal of Control and Decision》 EI 2023年第4期494-503,共10页
Because of its on-demand servicing and scalability features in cloud computing,security and confidentiality have converted to key concerns.Maintaining transaction information on thirdparty servers carries significant ... Because of its on-demand servicing and scalability features in cloud computing,security and confidentiality have converted to key concerns.Maintaining transaction information on thirdparty servers carries significant dangers so that malicious individuals trying for illegal access to information data security architecture.This research proposes a security-aware information transfer in the cloud-based on the blowfish algorithm(BFA)to address the issue.The user is verified initially with the identification and separate the imported data using pattern matching technique.Further,BFA is utilised to encrypt and save the data in cloud.This can safeguard the data and streamline the proof so that client cannot retrieve the information without identification which makes the environment secure.The suggested approach’s performance is evaluated using several metrics,including encryption time,decryption time,memory utilisation,and runtime.Compared to the existing methodology,the investigational findings clearly show that the method takes the least time to data encryption. 展开更多
关键词 blowfish algorithm cloud environment data encryption spotted hyena optimisation algorithm user authentication
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部