Abstract
Nowadays, there is a huge amount of data exchanged between different users; the security of the exchanged data has become a significant problem due to the existing of several security attacks. So, to increase the confidence of users several security techniques can be used together to enhance the level of security. In this research paper a new secure system is proposed. The proposed system employs cryptography and steganography together. The combination between cryptography and steganography contributes in increasing the security level to provide a robust system that can resist the security attacks. In this paper, the Twofish block cipher based cryptography is employed to encrypt the data. The Twofish permits trade-offs between speed, key setup time, software size, memory, and security level. The steganographic algorithm employed to hide the encrypted data into an image is the discrete wavelet transforms (DWT) algorithm. Different security tests are used to evaluate the security and functionality of the suggested algorithm, such as, the peak signal to noise ratio (PSNR) analysis and histogram analysis. The results reveal that, the algorithm proposed in this paper is secure.
Highlights
The rapid progress in computer networks allows a large amount of data to be transmitted over different kinds of computer networks
The encrypted data is generated using the Twofish block cipher algorithm, the Haar wavelet transform is applied to produce the stego image to be exchanged over a non-secure communication channel
peak signal to noise ratio (PSNR) and histogram analysis are employed in this research to examine the security of the proposed algorithm
Summary
The rapid progress in computer networks allows a large amount of data to be transmitted over different kinds of computer networks. People send personal data and sensitive document over these networks, military application, e – commerce, video conferencing and money transfer. All these applications are made over a non-secured channel. It is necessary to have strong security algorithms to protect these applications from attackers and to satisfy authentication, confidentiality and data integrity. Cryptography is defined as the art of protecting the data by the encryption process [1]. The encryption process transforms the original information (plaintext) into an unreadable data called ciphertext. In this case, only the person who has the secret key can recover the original information. The encryption process and hiding process are prepared in the transmitter while the decryption process and extraction process is done in the receiver
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.