Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 7
Page No. 2240 - 2243

Steganography Algorithm Based RSA Cryptosystem

Authors : Najlae FalahHameed Al Saffar

References

Boneh, D., 1999. Twenty years of attacks on the RSA cryptosystem. Notes Am. Math. Soc., 46: 203-213.
Direct Link  |  

Dunbar, B., 2002. A detailed look at steganographic techniques and their use in an open-systems environment. Sans Institute, New Orleans, USA.

El-Gamal, T., 1985. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory, 31: 469-472.
CrossRef  |  

Eltahir, M.E., M.L.M. Kiah, B.B. Zaidan and A.A. Zaidan, 2009. High rate video streaming steganography. Proceedings of the 2009 International Conference on Future Computer and Communication, April 03-05, IEEE Computer Society, Kuala Lumpur, Malaysia, pp: 550-553.

Islam, R., A. Siddiqa, P. Uddin, A. Kumar and M.D. Hossain, 2014. An Efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography. Proceedings of the 2014 3rd International Conference on Informatics, Electronics and Vision (ICIEV), May 23-24, 2014, IEEE, Dhaka, Bangladesh, ISBN:978-1-4799-5179-6, pp: 1-6.

Koblitz, N., 1987. Elliptic curve cryptosystems. Math. Comput., 48: 203-209.
Direct Link  |  

Manjunath, N. and S.G. Hiremath, 2015. Image and text steganography based on RSA and chaos cryptography algorithm with hash-LSB technique. Intl. J. Electr. Electron. Comput. Syst., 3: 5-9.
Direct Link  |  

Miller, V.S., 1986. Use of Elliptic Curves in Cryptography. In: Advances in Cryptology, Williams, H.C. (Ed.). Springer, Berlin, Germany, ISBN:978-3-540-16463-0, pp: 417-426.

Rivest, R.L., A. Shamir and L. Adleman, 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM., 21: 120-126.
CrossRef  |  Direct Link  |  

Roy, S. and P. Venkateswaran, 2014. Online payment system using steganography and visual cryptography. Proceedings of the 2014 International Conference on IEEE Students Electrical, Electronics and Computer Science (SCEECS), March 1-2, 2014, IEEE, Bhopal, India, ISBN:978-1-4799-2525-4, pp: 1-5.

Saleh, M.E., A.A. Aly and F.A. Omara, 2016. Data security using cryptography and steganography techniques. Intl. J. Adv. Comput. Sci. Appl., 7: 390-397.
Direct Link  |  

Sheth, R.K. and R.M. Tank, 2015. Image steganography techniques. Intl. J. Comput. Eng. Sci., 1: 10-15.
Direct Link  |  

Yadav, V., V. Ingale, A. Sapkal and G. Patil, 2014. Cryptographic steganography. Comput. Sci. Inf. Technol., 2014: 17-23.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved