Abstract
<pre>One of the techniques used in information security is the concealment technique, where the information to be hidden within another information medium to be saved in the process of messaging between two sides without detection. In this paper, an algorithm was proposed to conceal and encrypt data using several means.in order to ensure its preservation from detection and hackers. Wavelet transformer was used to change the shape of a wave of information (one and two-dimensional data) and its different mathematical formulas. Two sets of data were used, the first group used in a hidden process. The second group was considered as a means of both embedding and encryption. The data in the second group is reduced to the extent of sufficient for the modulation process, by extracting its high-value properties and then removing them from the mother's information wave. The process of encrypting of the two sets of data comes together using an exponential function. The result is undetectable information signals. Algorithms were built to hide and encrypt one and two-dimensional data. High-security signals and images were obtained. Decryption algorithms were built to return encrypted data to their original forms, and getting the replica data.</pre><p> </p>
Highlights
Cryptography and steganography are common methods to secure communications
The first was to use a wavelet transformer to change the shape of the signal or image to a different form of the original[6, 7]
It has become an important tool for data security especially in military applications for example 5 G is more security others wireless communication techniques [10, 11]
Summary
Cryptography and steganography are common methods to secure communications. The Steganography hides the message so it cannot be seen [1, 2]. This research is made to combine both cryptography and Steganography methods into one system for better confidentiality and security. In this advanced encrypting data hiding method, encrypted data can be embedded and extracted from both encrypted images. The first was to use a wavelet transformer to change the shape of the signal or image to a different form of the original[6, 7]. The proposed work includes: decompose both encrypting data and hiding data, generate the modulated medium, data embedding, data extraction, and data recovery
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Interactive Mobile Technologies (iJIM)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.