Delina Beh Mei Yin, Mardiana Mahari, Nurul Sharaz Azmanuddin, S. Omar
{"title":"无声保密:一种隐藏信息的混合隐写方案","authors":"Delina Beh Mei Yin, Mardiana Mahari, Nurul Sharaz Azmanuddin, S. Omar","doi":"10.1109/ICICTM.2016.7890810","DOIUrl":null,"url":null,"abstract":"Rapid growth of technology allows people to communicate electronically, but information privacy is not everyone that is aware of. Apparently, users may depend on solely encryption or data hiding, without realising our private message also can be exposed and tempered by the malicious user. This paper presents a hybrid approach of cryptographic approach before hiding the encrypted message into a cover image. The hybrid approach is binding the Extended Tiny Encryption (XTEA) algorithm with a session-based key generator. Our main focus is to retain the image quality after hiding a string of encrypted message. Subsequently, we also aim to prevent the secret message from being read or tempered by restricting the receiver reading the message within a time period that defined by the sender.","PeriodicalId":340409,"journal":{"name":"2016 International Conference on Information and Communication Technology (ICICTM)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Silent secrecy: A hybrid steganographic scheme to conceal information\",\"authors\":\"Delina Beh Mei Yin, Mardiana Mahari, Nurul Sharaz Azmanuddin, S. Omar\",\"doi\":\"10.1109/ICICTM.2016.7890810\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Rapid growth of technology allows people to communicate electronically, but information privacy is not everyone that is aware of. Apparently, users may depend on solely encryption or data hiding, without realising our private message also can be exposed and tempered by the malicious user. This paper presents a hybrid approach of cryptographic approach before hiding the encrypted message into a cover image. The hybrid approach is binding the Extended Tiny Encryption (XTEA) algorithm with a session-based key generator. Our main focus is to retain the image quality after hiding a string of encrypted message. Subsequently, we also aim to prevent the secret message from being read or tempered by restricting the receiver reading the message within a time period that defined by the sender.\",\"PeriodicalId\":340409,\"journal\":{\"name\":\"2016 International Conference on Information and Communication Technology (ICICTM)\",\"volume\":\"130 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Information and Communication Technology (ICICTM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICTM.2016.7890810\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Information and Communication Technology (ICICTM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICTM.2016.7890810","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Silent secrecy: A hybrid steganographic scheme to conceal information
Rapid growth of technology allows people to communicate electronically, but information privacy is not everyone that is aware of. Apparently, users may depend on solely encryption or data hiding, without realising our private message also can be exposed and tempered by the malicious user. This paper presents a hybrid approach of cryptographic approach before hiding the encrypted message into a cover image. The hybrid approach is binding the Extended Tiny Encryption (XTEA) algorithm with a session-based key generator. Our main focus is to retain the image quality after hiding a string of encrypted message. Subsequently, we also aim to prevent the secret message from being read or tempered by restricting the receiver reading the message within a time period that defined by the sender.