RSA Over-Encryption Employing RGB Channels through a Steganography Variant
R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, 1977.
Y. Liu and J. Zhang, Large-Capacity LSB information hiding scheme based on two-dimensional code, 7th IEEE International Conference on Electronics Information and Emergency Communication, 2017.
S. Mukherjee, S. Sinha, S. Chakrabarti and T. Mukhopadhyay, A meticulous implementation of RSA Algorithm, 1st International Conference on Electronics, Materials Engineering and Nano-Technology (IEMENTech), Kolkata, 2017.
J. Nath, and A. Nath. Advanced Steganography Algorithm using encrypted secret message. International Journal of advanced computer science and applications, 2.3, 2011.
K. Muhammad, et al. Secure image steganography using cryptography and image transposition. ArXiv preprint ArXiv: 1510.04413, 2015.
S. Almuhammadi, and A. Ahmed. A survey on recent approaches combining cryptography and steganography. Computer Science Information Technology, 2017.
S. Abu, and S. Hammoudeh, and A. Hammoudeh. AES Inspired Hex Symbols Steganography for Anti-Forensic Artifacts on Android Devices. Vol 7, 319-327, 2016.
S. Mare, M. Vladutiu, and L. Prodan, High capacity steganographic algorithm based on payload adaptation and optimization. In 2012 7th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI) (pp. 87-92). 2012.
D. Socek, H. Kalva, S. S. Magliveras, O. Marques, D. Culibrk, and B. Furht,” New approaches to encryption and steganography for digital videos,” Multimedia Systems, vol. 13, no. 3, pp. 191-204, 2007.
J. K. Saini and H. K. Verma,” A hybrid approach for image security by combining encryption and steganography,” in 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013). IEEE, 2013, pp.607-611.
P. Yadav, N. Mishra, and S. Sharma,” A secure video steganography with encryption based on LSB technique,” in 2013 IEEE International Conference on Computational Intelligence and Computing Research. IEEE, 2013, pp. 1-5.
A.A.AL-Shaaby and T. AlKharobi,” Cryptography and steganography: New approach,” Transactions on Networks and Communications, vol. 5, no. 6, p. 25, Dec. 2017 [Online]. Avail- able:http://22.214.171.124/index.php/TNC/article/view/3914
B. Karthikeyan, A. Deepak, K. Subalakshmi, A. R. MM, and V. Vaithiyanathan, ”A combined approach of steganography with LSB encoding technique and des algorithm,” in 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB). IEEE, 2017, pp.85-88.
A. Pandey and H. Agarwal,” Analysis on comparison of cryptography and steganography over an open channel”.
S. J. Indrabi, N. Saini, and M. Mohan, ”Secure data transmission based on combined effect of cryptography and steganography using visible light spectrum,” Inter- national Journal of Pure and Applied Mathematics, vol. 118, no. 20, pp. 2851-2860, 2018.
S. Gupta, A. Goyal, and B. Bhushan,” Information hiding using least significant bit steganography and cryptography,” International Journal of Modern Education and Computer Science, vol. 4, no. 6, p. 27, 2012.
N. A Al-Junaid, A. A Gutub, E. A Khan et al.,” Enhancing pc data security via combining RSA cryptography and video-based steganography,”2018.
X. Zhou, W. Gong, W. Fu, and L. Jin,” An improved method for LSB based color image steganography combined with cryptography,” in 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS). IEEE, 2016, pp. 1-4.
E. J. Kusuma, C. A. Sari, E. H. Rachmawanto et al., ”A combination of inverted LSB, RSA, and Arnold transformation to get secure and imperceptible image steganography,” Journal of ICT Research and Applications, vol. 12, no. 2, pp. 103-122, 2018.
IEEE Recommended Practice for Software Requirements Specifications, in IEEE Std. 830-1998, vol., no., pp.1-40, Oct. 20 1998, doi: 10.1109/IEEESTD.1998.88286.
S. Wandzura, F. Gyure, and B. Lim Fong. Scalable quantum computer.” U.S. Patent No. 7,875,876. 25 Jan. 2011.
R. Patidar, R. Bhartiya, Modified RSA cryptosystem based on offline storage and prime number, Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on, vol., no., pp.1,6, 26-28 Dec. 2013.
E.Salguero-Dorokhin, W. Fuertes, and E. Lascano, On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key, Security and Communication Networks, vol. 2019, Article ID 8214681, 10 pages, 2019. https://doi.org/10.1155/2019/8214681. 2019.
G. Singh, A study of encryption algorithms (RSA, DES, 3DES and AES) for information security, International Journal of Computer Applications, vol. 67, no. 19, pp. 33–38, 2013.
Q. Liu, Y. Li, T. Li, and L. Hao, The research of the batch RSA decryption performance, Journal of Comp. Information Systems, vol. 7, no. 3, pp.948–955, 2011.
Y. Prasant, P. Sharma, and K. Yadav. Implementation of RSA algorithm using Elliptic curve algorithm for security and performance enhancement, International Journal of Scientific and Technology Research 1.4, 102-105, 2012.
G. Francia, T. Gomez, Steganography obliterator: an attack on the least significant bits. In Proceedings of the 3rd annual conference on Information security curriculum development. ACM, pp. 85-91. 2006.
A. Jalal. Text in Image Steganography Using LSD Method. Doctoral Thesis. Middle East University, 2014.
F. Meneses, W. Fuertes, J. Sancho, S. Salvador, D. Flores, H. Aules and D. Nuela. ”RSA Encryption Algorithm Optimization to Improve Performance and Security Level of Network Messages, International Journal of Computer Science and Network Security (IJCSNS), 16(8), 55-62. 2016.
W. Fuertes, F. Meneses, L. Hidalgo, and J. Torres, RSA over-encryption implementation for networking. A proof of concept using mobile devices, Revista Investigacion Operacional, Vol. 41, 5, 2020, p. 586-598. ISSN 0257-4306.
E. Molina,” The Theory of Probability and Some Applications to Engineering Problems, Journal of the A.I.E.E., vol. 44, nº 2, pp. 122-127, 1925.
M. Dagadita, E. Slusanschi and R. Dobre, Data Hiding Using Steganography, Parallel and Distributed Computing (ISPDC), 2013 IEEE 12th International Symposium on, Bucharest, Romania, 2013.
W. Fuertes, J. E. Lopez de Vergara, F. Meneses and F. Galán,”A generic model for the management of virtual network environments,” 2010 IEEE Network Operations and Management Symposium - NOMS 2010, Osaka, 2010, pp. 813-816, doi: 10.1109/NOMS.2010.5488367.
- There are currently no refbacks.
Published by INSIGHT - Indonesian Society for Knowledge and Human Development