Hybrid Cryptosystem Using RC5 and SHA-3 with LSB Steganography for Image Protection
Abstract
Full Text:
PDF (65-72)References
B. S. Shishodia and M. J. Nene, “Data Leakage Prevention System for Internal Security,” in 2022 International Conference on Futuristic Technologies, INCOFT 2022, Institute of Electrical and Electronics Engineers Inc., 2022. doi: 10.1109/INCOFT55651.2022.10094509.
D. Teguh Yuwono et al., “DETEKSI SERANGAN VULNERABILITY PADA OPEN JURNAL SYSTEM MENGGUNAKAN METODE BLACK-BOX,” 2021. [Online]. Available: http://e-journal.stmiklombok.ac.id/index.php/jireISSN.2620-6900
H. Alatawi and C. Narmatha, “The Secret image hiding schemes using Steganography- Survey,” in 2020 International Conference on Computing and Information Technology, ICCIT 2020, Institute of Electrical and Electronics Engineers Inc., Sep. 2020. doi: 10.1109/ICCIT-144147971.2020.9213764.
O. Evsutin, A. Melman, and R. Meshcheryakov, “Digital steganography and watermarking for digital images: A review of current research directions,” IEEE Access, vol. 8, pp. 166589–166611, 2020, doi: 10.1109/ACCESS.2020.3022779.
S. A. Jebur, A. K. Nawar, L. E. Kadhim, and M. M. Jahefer, “Hiding Information in Digital Images Using LSB Steganography Technique,” International Journal of Interactive Mobile Technologies, vol. 17, no. 7, pp. 167–178, 2023, doi: 10.3991/ijim.v17i07.38737.
Y. Y. Wai and E. Myat, “Comparison of LSB, MSB and New Hybrid (NHB) of Steganography in Digital Image,” International Journal of Engineering Trends and Applications (IJETA), vol. 5, 2014, [Online]. Available: www.ijetajournal.org
P. L. N. Ramesh, M. Moorthi, Prathyusha Engineering College, and Institute of Electrical and Electronics Engineers, A Combined Approach of Steganography with LSB Encoding technique and DES Algorithm. 2017.
Rituraj Gaur, Dr. RekhaVig, and Ms. AmanpreetKaur, “An Effectual Hybrid Approach Using Data Encryption Standard (DES) and Secured Hash Algorithm (SHA) for Image Steganography,” 2018, [Online]. Available: http://www.ijritcc.org
R. Bhanot and R. Hans, “A review and comparative analysis of various encryption algorithms,” International Journal of Security and its Applications, vol. 9, no. 4, pp. 289–306, 2015, doi: 10.14257/ijsia.2015.9.4.27.
N. Advani, C. Rathod, and A. M. Gonsai, “Comparative Study of Various Cryptographic Algorithms Used for Text, Image, and Video,” in Advances in Intelligent Systems and Computing, Springer Verlag, 2019, pp. 393–399. doi: 10.1007/978-981-13-2285-3_46.
A. Jain and D. Bhatnagar, “A Comparative Study of Symmetric Key Encryption Algorithms,” IJCSN International Journal of Computer Science and Network, vol. 3, no. 5, 2014, [Online]. Available: www.IJCSN.org
H. K. Verma and R. K. Singh, “Performance Analysis of RC5, Blowfish and DES Block Cipher Algorithms.”
S. Atawneh, A. Almomani, and P. Sumari, “Steganography in Digital Images: Common Approaches and Tools.”
N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, “Image Steganography: A Review of the Recent Advances,” IEEE Access, vol. 9, pp. 23409–23423, 2021, doi: 10.1109/ACCESS.2021.3053998.
Tishk International University, Erbil Polytechnic University, Institute of Electrical and Electronics Engineers, and Institute of Electrical and Electronics Engineers. Iraq Section, Proposed Parallel Algorithms to Encryption Image Based on Hybrid Enhancement RC5 and RSA. 2019.
J. S, M. C, S. S, J. P, and S. S, “The Role of AES and RC5 Algorithm: A Cryptosystem Model to Secure Information in the Image based Steganography along with Watermarking,” Webology, vol. 18, no. 05, pp. 1158–1167, Oct. 2021, doi: 10.14704/web/v18si05/web18296.
Somchai Wen Dong and Wen Dang, Research on Base64 Encoding Algorithm and PHP Implementation. Institute of Electrical and Electronics Engineers, 2018.
Institute of Electrical and Electronics Engineers. Indonesia Section and Institute of Electrical and Electronics Engineers, Stegocrypt Sceheme Using LSB-AES Base64. 2019.
B. Schneier, Applied cryptography : protocols, algorithms, and source code in C. Wiley, 1996.
M. Begum and M. S. Uddin, “Digital image watermarking techniques: A review,” Feb. 01, 2020, MDPI AG. doi: 10.3390/info11020110.
P. V. Sanivarapu, K. N. V. P. S. Rajesh, K. M. Hosny, and M. M. Fouda, “Digital Watermarking System for Copyright Protection and Authentication of Images Using Cryptographic Techniques,” Applied Sciences (Switzerland), vol. 12, no. 17, Sep. 2022, doi: 10.3390/app12178724.
Refbacks
- There are currently no refbacks.