scispace - formally typeset
Open AccessJournal ArticleDOI

Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques

Reads0
Chats0
TLDR
In this paper, a hybrid data compression algorithm was proposed to increase the security level of the compressed data by using RSA (Rivest-Shamir-Adleman) cryptography.
Abstract
Data compression is an important part of information security because compressed data is more secure and easy to handle. Effective data compression technology creates efficient, secure, and easy-to-connect data. There are two types of compression algorithm techniques, lossy and lossless. These technologies can be used in any data format such as text, audio, video, or image file. The main objective of this study was to reduce the physical space on the various storage media and reduce the time of sending data over the Internet with a complete guarantee of encrypting this data and hiding it from intruders. Two techniques are implemented, with data loss (Lossy) and without data loss (Lossless). In the proposed paper a hybrid data compression algorithm increases the input data to be encrypted by RSA (Rivest–Shamir–Adleman) cryptography method to enhance the security level and it can be used in executing lossy and lossless compacting Steganography methods. This technique can be used to decrease the amount of every transmitted data aiding fast transmission while using slow internet or take a small space on different storage media. The plain text is compressed by the Huffman coding algorithm, and also the cover image is compressed by Discrete wavelet transform DWT based that compacts the cover image through lossy compression in order to reduce the cover image’s dimensions. The least significant bit LSB will then be used to implant the encrypted data in the compacted cover image. We evaluated that system on criteria such as percentage Savings percentage, Compression Time, Compression Ratio, Bits per pixel, Mean Squared Error, Peak Signal to Noise Ratio, Structural Similarity Index, and Compression Speed. This system shows a high-level performance and system methodology compared to other systems that use the same methodology.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Least Significant Bit Steganography for Text and Image hiding

TL;DR: In this paper , one of the spatial domain approaches has been considered for image hiding and text hiding, and experimental results has been performed for different target bit-planes to see the effect of this approach in text hiding and image hiding.
Journal ArticleDOI

A Novel and Robust Hybrid Blockchain and Steganography Scheme

TL;DR: The Ozyavas-Takaoglu-Ajlouni (OTA) method as mentioned in this paper was proposed to solve the limitation imposed on the size of the data to be hidden in the cover multimedia and low resistance to steganalysis after stego-operation.
Journal ArticleDOI

Chaos Based Encryption Technique for Compressed H264/AVC Videos

- 01 Jan 2022 - 
TL;DR: In this paper , two new proposed algorithms for compressed videos by the advanced H.264/AVC video coding are presented, one based on robust video encryption algorithm based on the chaos maps with random key to be tested under different attacks and the second algorithm approach has been implemented by using the hybrid of both steganography and cryptography based on chaotic maps for video frames.
Journal ArticleDOI

Chaos Based Encryption Technique for Compressed H264/AVC Videos

TL;DR: In this article , two new proposed algorithms for compressed videos by the advanced H.264/AVC video coding are presented, one based on robust video encryption algorithm based on the chaos maps with random key to be tested under different attacks and the second algorithm approach has been implemented by using the hybrid of both steganography and cryptography based on chaotic maps for video frames.
References
More filters
Journal ArticleDOI

Image quality assessment: from error visibility to structural similarity

TL;DR: In this article, a structural similarity index is proposed for image quality assessment based on the degradation of structural information, which can be applied to both subjective ratings and objective methods on a database of images compressed with JPEG and JPEG2000.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

An improved DWT-SVD domain watermarking for medical information security

TL;DR: Experimental results demonstrate that the suggested watermarking technique archives high robustness against attacks in comparison to the other scheme for medical images, and verification its robustness for various attacks while maintaining imperceptibility, security and compression ratio.
Journal ArticleDOI

An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding

TL;DR: An efficient visually meaningful image compression and encryption (VMICE) scheme is proposed by combining compressive sensing (CS) and Least Significant Bit (LSB) embedding, robust to known-plain text and chosen-plaintext attacks.
Proceedings ArticleDOI

Channel-Wise Autoregressive Entropy Models for Learned Image Compression

TL;DR: This work introduces two enhancements, channel-conditioning and latent residual prediction, that lead to network architectures with better rate-distortion performance than existing context-adaptive models while minimizing serial processing.
Related Papers (5)