Robust video data security using hybrid cryptography-steganography technique
Abstract
Full Text:
PDFReferences
S. S. Ghazoul, Y. H. Ali, A. T. J. E. Hashim, and T. Journal, "Developed method of information hiding in video AVI file based on hybrid encryption and steganography," vol. 29, no. 2, pp. 359-373, 2011.
S. P. Sahu and S. Verma, "Secured and authentic communication by combined approach of digital watermarking and steganography," in International Conference on Advances in Communication, Network, and Computing, 2011, pp. 595-599: Springer.
G. P. Rajkumar, V. J. I. J. o. C. N. Malemath, and I. Security, "Video Steganography: Secure Data Hiding Technique," vol. 9, no. 9, 2017.
M. E. Saleh, A. A. Aly, and F. A. Omara, "Data security using cryptography and steganography techniques," ed: IJACSA) International Journal of Advanced Computer Science and Applications, 2016.
O. H. Yahya, H. Alrikabi, I. A. J. I. J. o. O. Aljazaery, and B. Engineering, "Reducing the Data Rate in Internet of Things Applications by Using Wireless Sensor Network," vol. 16, no. 03, pp. 107-116, 2020.
M. K. I. Rahmani, K. Arora, N. J. I. J. o. A. C. S. Pal, and Application, "A crypto-steganography: A survey," vol. 5, pp. 149-154, 2014.
A. A. J. Altaay, S. B. Sahib, and M. Zamani, "An introduction to image steganography techniques," in 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), 2012, pp. 122-126: IEEE.
F. H. M. J. I. J. o. E. E. Al-Kadei and C. Science, "Two-level hiding an encrypted image," vol. 18, no. 2, pp. 961-969, 2020.
D. Socek, H. Kalva, S. S. Magliveras, O. Marques, D. Culibrk, and B. J. M. S. Furht, "New approaches to encryption and steganography for digital videos," vol. 13, no. 3, pp. 191-204, 2007.
M. A. a. Roa'a, I. A. Aljazaery, S. K. Al_Dulaimi, H. T. S. J. B. o. E. E. Alrikabi, and Informatics, "Generation of High Dynamic Range for Enhancing the Panorama Environment," vol. 10, no. 1, 2020.
K. N. Jassim et al., "Hybrid cryptography and steganography method to embed encrypted text message within image," in Journal of Physics: Conference Series, 2019, vol. 1339, no. 1, p. 012061: IOP Publishing.
H. T. S. Al-Rikabi, Enhancement of the MIMO-OFDM Technologies. California State University, Fullerton, 2013.
I. A. Aljazaery, H. T. S. Alrikabi, and M. R. J. i. Aziz, "Combination of Hiding and Encryption for Data Security," vol. 14, no. 9, p. 35, 2020.
A. H. M. Alaidi and A. Mahmood, "Distributed hybrid method to solve multiple traveling salesman problems," in 2018 International Conference on Advance of Sustainable Engineering and its Application (ICASEA), 2018, pp. 74-78: IEEE.
S. R. Ratna, J. S. Loret, D. M. Gethsy, P. P. Krishnan, and P. A. Prabu, "A Review on Various Approaches in Video Steganography," in Intelligent Communication Technologies and Virtual Mobile Networks, 2019, pp. 626-632: Springer.
N. S. Alseelawi, E. K. Adnan, H. T. Hazim, H. Alrikabi, and K. Nasser, "Design and Implementation of an E-learning Platform Using N-Tier Architecture," 2020.
E. Najafi, K. J. J. o. i. s. Loukhaoukha, and applications, "Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform," vol. 44, pp. 144-156, 2019.
M. J. W. A. o. S. Ramalingam, Engineering and Technology, "Stego machine–video steganography using modified LSB algorithm," vol. 74, pp. 502-505, 2011.
O. H. Yahya, H. T. ALRikabi, R. a. M. Al_airaji, and M. J. I. J. o. I. M. T. Faezipour, "Using Internet of Things Application for Disposing of Solid Waste," vol. 14, no. 13, 2020.
N. A. Minas, F. H. MohammedSediq, and A. I. J. k. u. j. f. s. s. Salih, "Color Image Encryption Using Hybrid Method of Fractal-Based Key and Private XOR Key," vol. 13, no. 1, pp. 104-117, 2018.
N. A. Hussiena, A. H. M. Alaidib, T. A. Alquraishc, and G. F. Smaisim, "Improvement the Route Discovery Mechanism of Dynamic Source Routing Protocol in MANET."
N. Sharma, J. Bhatia, and D. N. J. P. Gupta, Chandigarh, "An encrypto-stego technique based secure data transmission system," 2005.
N. K. Jain, R. Saini, and P. Mittal, "A Review on Traffic Monitoring System Techniques," in Soft Computing: Theories and Applications: Springer, 2019, pp. 569-577.
S. Arunkumar, V. Subramaniyaswamy, R. J. E. E. T. o. P. H. Logesh, and Technology, "Hybrid Robust Image Steganography approach for the secure transmission of biomedical images in Cloud," vol. 5, no. 18, 2019.
O. Salman, I. H. Elhajj, A. Kayssi, and A. J. A. o. T. Chehab, "A review on machine learning–based approaches for Internet traffic classification," pp. 1-38, 2020.
A. Arya, S. J. I. J. o. F. R. i. C. S. Soni, and C. Engineering, "A literature review on various recent steganography techniques," vol. 4, no. 1, pp. 143-149, 2018.
S. Pal, S. K. J. I. J. o. I. R. Bandyopadhyay, and Review, "Various Methods of Video Steganography," vol. 3, no. 6, pp. 2569-2573, 2016.
S. J. Indrabi, N. Saini, M. J. I. J. o. P. Mohan, and A. Mathematics, "Secure data transmission based on combined effect of cryptography and steganography using visible light spectrum," vol. 118, no. 20, pp. 2851-2860, 2018.
I. Al-Barazanchi, S. A. Shawkat, M. H. Hameed, and K. S. L. Al-Badri, “Modified RSA-based algorithm: A double secure approach,” Telkomnika (Telecommunication Comput. Electron. Control., vol. 17, no. 6, pp. 2818–2825, 2019.
N. J. Qasim and I. Barazanchi, “Unconstrained Joint Face Detection and Recognition in Video Surveillance System,” Jour Adv Res. Dyn. Control Syst., vol. 11, no. 1, pp. 1855–1862, 2019.
H. K. Silman and A. E. Ali, “Breast cancer identification based on artificial intelligent system”, Sustainable Engineering and Innovation, vol. 2, no. 2, pp. 41-49, 2020.
DOI: http://dx.doi.org/10.21533/pen.v8i3.1612
Refbacks
- There are currently no refbacks.
Copyright (c) 2020 Faten H.Mohammed Sediq Al-Kadei
This work is licensed under a Creative Commons Attribution 4.0 International License.
ISSN: 2303-4521
Digital Object Identifier DOI: 10.21533/pen
This work is licensed under a Creative Commons Attribution 4.0 International License