Int J Performability Eng ›› 2024, Vol. 20 ›› Issue (10): 591-601.doi: 10.23940/ijpe.24.10.p1.591601
• Original article • Next Articles
Kukreja Bhawnaa*(), Kumar Malik Sanjaya, and Sharma Ajayb
Submitted on
;
Revised on
;
Accepted on
Contact:
Kukreja Bhawna
E-mail:75515210004@stu.srmuniversity.ac.in
About author:
E-mail address: 75515210004@stu.srmuniversity.ac.in
Kukreja Bhawna, Kumar Malik Sanjay, and Sharma Ajay. A Novel Citadel Security Framework for Cyber Data using CryptSteg Techniques [J]. Int J Performability Eng, 2024, 20(10): 591-601.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
[1] | Puech, W. , Chaumont, M . and Strauss, O. , 2008, March. A reversible data hiding method for encrypted images. In Security, forensics, steganography, and watermarking of multimedia contents X (Vol . 6819, pp. 534- 542). SPIE. |
[2] | John Justin, M . and Manimurugan, S. , 2012. A survey on various encryption techniques. International Journal of Soft Computing and Engineering (IJSCE) ISSN, 2231, p. 2307. |
[3] | Patel, K. , Utareja, S . and Gupta, H. , 2013. A survey of information hiding techniques. International Journal of Emerging Technology and Advanced Engineering, 3( 1), pp. 347- 350. |
[4] | Babaei, M. , 2013. A novel text and image encryption method based on chaos theory and DNA computing. Natural computing, 12( 1), pp. 101- 107. |
[5] | Rahmani, M.K.I. , Arora, K . and Pal, N., 2014. A crypto-steganography: A survey. International Journal of Advanced computer science and applications, 5( 7). |
[6] | Gaikwad, D.P. , Jagdale, T. , Dhanokar, S. , Moghe, A . and Pathak, A. , 2014. Hiding the Text and Image Message of Variable Size Using Encryption and Compression Algorithms in Video Steganography. International Journal of Engineering Research and Applications (IJERA), 1( 2), pp. 102- 108. |
[7] | Bouslimi, D. , Coatrieux, G. , Cozic, M . and Roux, C. , 2016. Data hiding in encrypted images based on predefined watermark embedding before encryption process. Signal Processing: Image Communication, 47, pp. 263- 270. |
[8] | Almuhammadi, S . and Al-Shaaby, A. , 2017. A survey on recent approaches combining cryptography and steganography. Computer Science Information Technology (CS IT), pp. 63- 74. |
[9] | Haque, M.S. and Chowdhury, M.U. , 2018. A new cyber security framework towards secure data communication for unmanned aerial vehicle (UAV). In Security and Privacy in Communication Networks: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings 13 (pp. 113- 122). Springer International Publishing. |
[10] | Abbood, E.A. , Neamah, R.M. and Abdulkadhm, S. , 2018. Text in Image Hiding using Developed LSB and Random Method. International Journal of Electrical & Computer Engineering (2088-8708), 8( 4). |
[11] | Khari, M. , Garg, A.K. , Gandomi, A.H. , Gupta, R. , Patan, R . and Balusamy, B. , 2019. Securing data in Internet of Things (IoT) using cryptography and steganography techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 50( 1), pp. 73- 80. |
[12] | Taha, M.S. , Mohd Rahim, M.S. , Lafta, S.A. , Hashim, M.M. and Alzuabidi, H.M. , 2019, May. Combination of steganography and cryptography:A short survey. In IOP conference series: materials science and engineering (Vol. 518, No. 5, p. 052003). IOP Publishing. |
[13] | Hashim, M.M. , Taha, M.S. , Aman, A.H.M. , Hashim, A.H.A. , Rahim, M.S.M. and Islam, S. , 2019, October. Securing medical data transmission systems based on integrating algorithm of encryption and steganography. In 2019 7th International Conference on Mechatronics Engineering (ICOM) (pp . 1- 6). IEEE. |
[14] | Wu, H.T. , Cheung, Y.M. , Yang, Z . and Tang, S. , 2019. A high-capacity reversible data hiding method for homomorphic encrypted images. Journal of Visual Communication and Image Representation, 62, pp. 87- 96. |
[15] | Baagyere, E.Y. , Agbedemnab, P.A.N. , Qin, Z. , Daabo, M.I. and Qin, Z., 2020. A multi-layered data encryption and decryption scheme based on genetic algorithm and residual numbers. IEEE Access, 8, pp. 100438- 100447. |
[16] | Abd-El-Atty, B. , Iliyasu, A.M. , Alaskar, H . and Abd El-Latif, A.A. , 2020. A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms. Sensors, 20( 11), p. 3108. |
[17] | Nunna, K.C. and Marapareddy, R. , 2020, March. Secure data transfer through internet using cryptography and image steganography. In 2020 SoutheastCon (Vol. 2, pp. 1- 5). IEEE. |
[18] | Islam, M.A. , Riad, M.A.A.K. and Pias, T.S. , 2021, January. Enhancing security of image steganography using visual cryptography. In 2021 2nd International conference on robotics, electrical and signal processing techniques (ICREST) (pp. 694- 698). IEEE. |
[19] | Anudini, A.K.S.A. , Gayamini, G . and Weerawardane, T.L. , 2021. A Systematic Review on Secure Data Transmission in the Cloud Using Steganographic Techniques and Cryptographic Algorithms. |
[20] | Datta, D. , Garg, L. , Srinivasan, K. , Inoue, A. , Reddy, G.T. , Reddy, M. , Ramesh, K . and Nasser, N. , 2021. An efficient sound and data steganography based secure authentication system. |
[21] | Wahab, O.F.A. , Khalaf, A.A. , Hussein, A.I. and Hamed, H.F. , 2021. Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE access, 9, pp. 31805- 31815. |
[22] | Singh, R . and Sharma, A.K. , 2015. An Optimistic Approach for Text Data Concealment in an RGB Image using CryptSteg Technique. International Journal of Computer Applications, 117( 19). |
[23] | Osman, O.M. , Kanona, M.E.A. , Hassan, M.K. , Elkhair, A.A.E. and Mohamed, K.S. , 2022. Hybrid multistage framework for data manipulation by combining cryptography and steganography. Bulletin of Electrical Engineering and Informatics, 11( 1), pp. 327- 335. |
[24] | Taha, M.S. , Mohd Rahim, M.S. , Lafta, S.A. , Hashim, M.M. and Alzuabidi, H.M. , 2019, May. Combination of steganography and cryptography:A short survey. In IOP conference series: materials science and engineering (Vol. 518, No. 5, p. 052003). IOP Publishing. |
[25] | Varghese, F . and Sasikala, P. , 2023. A detailed review based on secure data transmission using cryptography and steganography. Wireless Personal Communications, 129( 4), pp. 2291- 2318. |
[26] | Alsaad, M.M.B. , Enhanced Data Security Framework by Using a Combination between Cryptography and Steganography Technique. |
[27] | Sheshasaayee, A . and Sumathy, D. , 2017. A framework to enhance security for otp sms in e-banking environment using cryptography and text steganography. In Proceedings of the International Conference on Data Engineering and Communication Technology: ICDECT 2016, Volume 2 (pp. 709- 717). Springer Singapore. |
[28] | Kannadhasan, S . and Nagarajan, R. , 2021. Secure framework data security using cryptography and steganography in internet of things. In Multidisciplinary approach to modern digital steganography (pp . 258- 278). IGI Global. |
[29] | Kumar, V. , Kaur, H . and Paul, S. , 2021, April. CryptMe: a cryptographic framework with steganography for securing data. In 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM) (pp . 294- 299). IEEE. |
[1] | Sudeep Varshney, Hoor Fatima, Preeti Dubey, Amit Kumar Upadhyay, and Sarthak Tyagi. Plug and Play Device for In-Depth RAM Data Repository [J]. Int J Performability Eng, 2024, 20(8): 520-528. |
[2] | Mohan Krishnan O, Srinithi J, Sri Harshitha P, Ilamughi M, and Antony Seba P. Gesture Vault: Revolutionizing ATMs with Touchless Technology [J]. Int J Performability Eng, 2024, 20(7): 413-420. |
[3] | Ajeet Kumar Sharma and Rakesh Kumar. IoT Malware Detection and Dynamic Analysis of MQTT Simulated Network [J]. Int J Performability Eng, 2024, 20(7): 451-459. |
[4] | Abhishek Gupta and Jaspreet Singh. Data-Driven Security Framework for VANET using Firefly and ANN [J]. Int J Performability Eng, 2024, 20(6): 344-354. |
[5] | Vikas Verma, Arun Malik, and Isha Batra. Analyzing and Classifying Malware Types on Windows Platform using an Ensemble Machine Learning Approach [J]. Int J Performability Eng, 2024, 20(5): 312-318. |
[6] | Neha Kashyap, Sapna Sinha, and Vineet Kansal. A Hybrid Lightweight Method of ABE with SHA1 Algorithm for Securing the IoT Data on Cloud [J]. Int J Performability Eng, 2024, 20(3): 131-138. |
[7] | Kanchan Bala Jaswal and Pawan Thakur. Efficiency and Security in WSN Routing through Hybrid Algorithm Fusion [J]. Int J Performability Eng, 2024, 20(3): 167-176. |
[8] | Rashmi Kushwah. Navigating the Cybersecurity Landscape: Vulnerabilities, Mitigation Strategies and Future Outlooks [J]. Int J Performability Eng, 2024, 20(11): 688-698. |
[9] | Taniya Hasija, K. R. Ramkumar, Bhupendra Singh, Amanpreet Kaur, and Sudesh Kumar Mittal. A Performance Analysis of Root-Converging Methods for Developing Post Quantum Cryptography Algorithms to Mitigate Key-Size-Based Attacks [J]. Int J Performability Eng, 2023, 19(4): 252-262. |
[10] | Divya Singhal, Laxmi Ahuja, and Ashish Seth. An Insight into Combating Security Attacks for Smart Grid [J]. Int J Performability Eng, 2022, 18(7): 512-520. |
[11] | Savitha A. C., M. N. Jayaram, and Mallikarjuna Swamy S.. Development of Energy Efficient and Secure Routing Protocol for M2M Communication [J]. Int J Performability Eng, 2022, 18(6): 426-433. |
[12] | Soumit Mandal, Anindya Mitra, Sumagna Dey, Pradyut Nath, and Subhrapratim Nath. Encrypted Neural Network [J]. Int J Performability Eng, 2022, 18(6): 453-462. |
[13] | Hongjing Deng, Xuan Zhang, Jiahao Jiang, Jie Wang, and Hexiang Huang. Privacy Protection of Personal Education Information on Blockchain [J]. Int J Performability Eng, 2022, 18(5): 317-328. |
[14] | S. Guru Prasad, M. K. Badrinarayanan, and V. Ceronmani Sharmila. Efficacy and Security Effectiveness: Key Parameters in Evaluation of Network Security [J]. Int J Performability Eng, 2022, 18(4): 282-288. |
[15] | Bhushan Chaudhari. Role of Swarm Intelligence Algorithms on Secured Wireless Network Sensor Environment - A Comprehensive Review [J]. Int J Performability Eng, 2022, 18(2): 92-100. |
|