95
Views
1
CrossRef citations to date
0
Altmetric
Communications

A Novel Scrambled Data Hiding Approach Towards Securing Sensitive Data

ORCID Icon &

References

  • R. Mishra, and P. Bhanodiya, “A review on steganography and cryptography,” IEEE Int. Conf. Adv. Comput. Eng. Appl., pp. 119–122, 2015.
  • N. Tsafack, et al., “A new chaotic map with dynamic analysis and encryption application in internet of health things,” IEEE. Access., Vol. 8, pp. 137731–137744, 2020.
  • A. A. Abd El-Latif, B. Abd-El-Atty, M. Amin, and A. M. Iliyasu, “Quantum inspired cascaded discrete time quantum walks with induced chaotic dynamics and cryptographic applications,” Nat. Sci. Rep., Vol. 10, pp. 1930, 2020.
  • A. A. Abd El-Latif, B. Abd-El-Atty, S. E. Venegas-Andraca, and W. Mazurczyk, “Efficient quantum based security protocols for information sharing and data protection in 5G networks,” Future Gener. Comput. Syst., Vol. 100, pp. 893–906, 2019.
  • A. A. Abd El-Latif, B. Abd-El-Atty, E. M. Abou-Nasser, and S. E. Venegas-Andraca, “Controlled alternate quantum walks based privacy preserving healthcare images in internet of things,” Opt. Laser. Technol., Vol. 124, no. 105942, pp. 1–8, 2020.
  • A. A. Abd El-Latif, X. Yan, L. Li, N. Wang, J.-L. Peng, and X. Niu, “A new meaningful secret sharing scheme based on random grids, error diffusion, and chaotic encryption,” Opt. Laser. Technol., Vol. 54, pp. 389–400, 2013.
  • A. Phapale, “Cryptographic approach using audio for data security,” Int. J. Recent Innov. Trends Comput. Commun., Vol. 3, no. 2, pp. 825–827, 2015.
  • B. B. Zaidan, A. A. Zaidan, A. K. Al-Frajat, and H. A. Jalab, “On the differences between hiding information and cryptography techniques: An overview,” J. Appl. Sci., Vol. 10, no. 15, pp. 1650–1655, 2010.
  • O. C. Abikoye, K. S. Adewole, and A. J. Oladipupo, “Efficient data hiding system using cryptography and steganography,” Int. J. Appl. Inf. Syst., Vol. 4, no. 11, pp. 6–11, 2012.
  • S. A. Parah, J. A. Sheikh, A. M. Hafiz, and G. M. Bhat, “Data hiding in scrambled images: A new double layer security data hiding technique,” Comput. Electr. Eng., Vol. 40, no. 1, pp. 70–82, 2014.
  • A. Shaik, V. Thanikaiselvan, and R. Amitharajan, “Data security through data hiding in images: A review,” J. Artif. Intell., Vol. 10, no. 1, pp. 1–21, 2016.
  • N. Sinha, A. Bhowmick, and B. Kishore, “Encrypted information hiding using audio steganography and audio cryptography,” Int. J. Comput. Appl., Vol. 112, no. 5, pp. 49–53, 2015.
  • B. Harjito, B. Sulistvarso, and E. Survani, “Audio steganography using two LSB modification and RSA for security data transmission,” J. Telecommun. Electron. Comput. Eng., Vol. 10, no. 2–4, pp. 107–111, 2018.
  • A. R. Deshpande, and N. N. Kant, “Security enhancement in audio steganography by encryption algorithm,” Int. J. Emerg. Technol. Eng. Res., Vol. 4, no. 2, pp. 73–76, 2016.
  • A. Gambhir, and R. Arya, “Performance analysis and implementation of DES algorithm and RSA algorithm with image and audio steganography techniques,” in Computing, Communication and Signal Processing, Springer, 2019, pp. 1021–1028.
  • P. P. Balgurgi, and S. K. Jagtap, “Audio steganography used for secure data transmission,” in Proceedings of International Conference on Advances in Computing, 2013, pp. 699–706.
  • A. B. Nasution, S. Efendi, and S. Suwilo, “Image steganography in securing sound file using arithmetic coding algorithm, triple data encryption standard (3DES) and modified least significant Bit (MLSB),” in Journal of Physics: Conference Series, IOP Publishing, 2018.
  • S. Limkar, A. Nemade, A. Badgujar, and R. Kate, “Improved data hiding technique based on audio and video steganography,” in Smart Computing and Informatics, Springer, 2018, pp. 581–588.
  • S. M. Alwahbani, and H. T. Elshoush, “Chaos-based audio steganography and cryptography using LSB method and One-time Pad,” in Proceedings of SAI Intelligent Systems Conference, Springer, 2016, pp. 755–768.
  • D. Kundu, and A. Upreti, “Study of various steganography tools,” in International Conference on Automation and Computational Engineering (ICACE), IEEE, 2018, pp. 117–120.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.