CryptStego: Powerful Blend of Cryptography and Steganography for Securing Communications
dc.authorscopusid | Alaa Ali Hameed / 56338374100 | |
dc.authorwosid | Alaa Ali Hameed / ABI-8417-2020 | |
dc.contributor.author | Pandey, Shraiyash | |
dc.contributor.author | Baniya, Pashupati | |
dc.contributor.author | Nand, Parma | |
dc.contributor.author | Hameed, Alaa Ali | |
dc.contributor.author | Bhushan, Bharat | |
dc.contributor.author | Jamil, Akhtar | |
dc.date.accessioned | 2025-04-18T08:45:27Z | |
dc.date.available | 2025-04-18T08:45:27Z | |
dc.date.issued | 2024 | |
dc.department | İstinye Üniversitesi, Mühendislik ve Doğa Bilimleri Fakültesi, Bilgisayar Mühendisliği Bölümü | |
dc.description.abstract | In today’s era, security is one of the most critical issues in the development of electronic communications applications, especially when sending private data. The data may be encrypted with several algorithms; however, an extra layer of security can improve protection by a significant amount. Therefore, in this paper, we have developed an application, CryptStego, to secure data using two techniques, cryptography and steganography, to transmit data securely. The encryption of original data is executed using Blowfish algorithm, a cryptographic technique. Additionally, the encrypted data is hidden through using Least Significant Bit (LSB), a steganography technique. The implementation of both techniques offers an extensive level of security, since an intruder must firstly identify the encrypted text within the image to attain the encrypted text, then secondly to decrypt using the algorithm to obtain the original message. Therefore, any intruder must encounter multiple levels of security to obtain the original message from the cipher image. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. | |
dc.identifier.citation | Pandey, S., Baniya, P., Nand, P., Hameed, A. A., Bhushan, B., & Jamil, A. (2023, September). CryptStego: Powerful Blend of Cryptography and Steganography for Securing Communications. In International Conference on Emerging Trends and Applications in Artificial Intelligence (pp. 532-543). Cham: Springer Nature Switzerland. | |
dc.identifier.doi | 10.1007/978-3-031-56728-5_44 | |
dc.identifier.endpage | 543 | |
dc.identifier.issn | 23673370 | |
dc.identifier.scopus | 2-s2.0-85193575938 | |
dc.identifier.scopusquality | Q4 | |
dc.identifier.startpage | 532 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12713/6606 | |
dc.identifier.volume | 960 | |
dc.indekslendigikaynak | Scopus | |
dc.institutionauthor | Hameed, Alaa Ali | |
dc.institutionauthorid | Alaa Ali Hameed / 0000-0002-8514-9255 | |
dc.language.iso | en | |
dc.publisher | Springer Science and Business Media Deutschland GmbH | |
dc.relation.ispartof | Lecture Notes in Networks and Systems | |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | |
dc.rights | info:eu-repo/semantics/closedAccess | |
dc.subject | Blowfish Algorithm | |
dc.subject | Cryptography | |
dc.subject | Least Significant Bit (LSB) | |
dc.subject | Steganography | |
dc.subject | Web-Application | |
dc.title | CryptStego: Powerful Blend of Cryptography and Steganography for Securing Communications | |
dc.type | Conference Object |
Dosyalar
Lisans paketi
1 - 1 / 1
Küçük Resim Yok
- İsim:
- license.txt
- Boyut:
- 1.17 KB
- Biçim:
- Item-specific license agreed upon to submission
- Açıklama: