CryptStego: Powerful Blend of Cryptography and Steganography for Securing Communications

dc.authorscopusidAlaa Ali Hameed / 56338374100
dc.authorwosidAlaa Ali Hameed / ABI-8417-2020
dc.contributor.authorPandey, Shraiyash
dc.contributor.authorBaniya, Pashupati
dc.contributor.authorNand, Parma
dc.contributor.authorHameed, Alaa Ali
dc.contributor.authorBhushan, Bharat
dc.contributor.authorJamil, Akhtar
dc.date.accessioned2025-04-18T08:45:27Z
dc.date.available2025-04-18T08:45:27Z
dc.date.issued2024
dc.departmentİstinye Üniversitesi, Mühendislik ve Doğa Bilimleri Fakültesi, Bilgisayar Mühendisliği Bölümü
dc.description.abstractIn today’s era, security is one of the most critical issues in the development of electronic communications applications, especially when sending private data. The data may be encrypted with several algorithms; however, an extra layer of security can improve protection by a significant amount. Therefore, in this paper, we have developed an application, CryptStego, to secure data using two techniques, cryptography and steganography, to transmit data securely. The encryption of original data is executed using Blowfish algorithm, a cryptographic technique. Additionally, the encrypted data is hidden through using Least Significant Bit (LSB), a steganography technique. The implementation of both techniques offers an extensive level of security, since an intruder must firstly identify the encrypted text within the image to attain the encrypted text, then secondly to decrypt using the algorithm to obtain the original message. Therefore, any intruder must encounter multiple levels of security to obtain the original message from the cipher image. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.
dc.identifier.citationPandey, S., Baniya, P., Nand, P., Hameed, A. A., Bhushan, B., & Jamil, A. (2023, September). CryptStego: Powerful Blend of Cryptography and Steganography for Securing Communications. In International Conference on Emerging Trends and Applications in Artificial Intelligence (pp. 532-543). Cham: Springer Nature Switzerland.
dc.identifier.doi10.1007/978-3-031-56728-5_44
dc.identifier.endpage543
dc.identifier.issn23673370
dc.identifier.scopus2-s2.0-85193575938
dc.identifier.scopusqualityQ4
dc.identifier.startpage532
dc.identifier.urihttps://hdl.handle.net/20.500.12713/6606
dc.identifier.volume960
dc.indekslendigikaynakScopus
dc.institutionauthorHameed, Alaa Ali
dc.institutionauthoridAlaa Ali Hameed / 0000-0002-8514-9255
dc.language.isoen
dc.publisherSpringer Science and Business Media Deutschland GmbH
dc.relation.ispartofLecture Notes in Networks and Systems
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanı
dc.rightsinfo:eu-repo/semantics/closedAccess
dc.subjectBlowfish Algorithm
dc.subjectCryptography
dc.subjectLeast Significant Bit (LSB)
dc.subjectSteganography
dc.subjectWeb-Application
dc.titleCryptStego: Powerful Blend of Cryptography and Steganography for Securing Communications
dc.typeConference Object

Dosyalar

Lisans paketi
Listeleniyor 1 - 1 / 1
Küçük Resim Yok
İsim:
license.txt
Boyut:
1.17 KB
Biçim:
Item-specific license agreed upon to submission
Açıklama: