A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
- Published: 27 March 2023
- Volume 129 , pages 2291–2318, ( 2023 )
Cite this article
- Fredy Varghese 1 , 2 &
- P. Sasikala 3
681 Accesses
9 Citations
Explore all metrics
During the last few decades, digital communication has played a vital role in various sectors such as healthcare departments, banking, information technology companies, industries, and other fields. Nowadays, all data are transmitted over the Internet, which needs high protection for transmitting the original data from source to destination. In order to secure digital communication, cryptography and steganography methods are used to achieve data security over insecure and open networks like the Internet. Cryptography is the method of encrypting secret information in an unreadable structure. Based on the cryptography method, the original message can be distorted before data transmission. On the other hand, steganography covers secret data such as audio, image, text, and video. It can hide the message while transmitting the original information from one end to another. The data combines images, texts, audio and videos, which are communicated worldwide through the Internet. This review paper gives an analysis based on the concept of cryptography and steganography. It also presents a comparative approach using several encryption algorithms with several factors such as block size, key size, encryption speed, memory usage, and security level.
This is a preview of subscription content, log in via an institution to check access.
Access this article
Price includes VAT (Russian Federation)
Instant access to the full article PDF.
Rent this article via DeepDyve
Institutional subscriptions
Similar content being viewed by others
Image encryption techniques: A comprehensive review
Hoshang Kolivand, Sabah Fadhel Hamood, … Mohd Shafry Rahim
Video steganography: recent advances and challenges
Jayakanth Kunhoth, Nandhini Subramanian, … Ahmed Bouridane
PSNR vs SSIM: imperceptibility quality assessment for image steganography
De Rosal Igantius Moses Setiadi
Availability of Data and Materials
No data Availability.
Balaji, R., & Naveen, G. (2011). Secure data transmission using video Steganography. In 2011 IEEE International Conference on Electro/Information Technology , IEEE, pp. 1–5.
Vijayakumar, P., Azees, M., Kannan, A., & Deborah, L. J. (2015). Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17 (4), 1015–1028.
Article Google Scholar
Ozdemir, S., & Xiao, Y. (2009). Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks, 53 (12), 2022–2037.
Article MATH Google Scholar
Zhang, X. (2011). Reversible data hiding in encrypted image. IEEE Signal Processing Letters, 18 (4), 255–258.
Jung, K. H., & Yoo, K. Y. (2009). Data hiding method using image interpolation. Computer Standards and Interfaces, 31 (2), 465–470.
Zhou, X., & Tang, X. (2011). Research and implementation of RSA algorithm for encryption and decryption. In Proceedings of 2011 6th international forum on strategic technology IEEE , vol. 2, pp. 1118–1121.
Elbirt, A. J., & Paar, C. (2005). An instruction-level distributed processor for symmetric-key cryptography. IEEE Transactions on Parallel and distributed Systems, 16 (5), 468–480.
Chatterjee, D., Nath, J., Dasgupta, S., & Nath, A. (2011). A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm. In 2011 International conference on communication systems and network technologies , pp. 89–94. IEEE.
Nath, A., Ghosh, S., & Mallick, M. A. (2010). Symmetric Key Cryptography Using Random Key Generator. In Security and Management , pp. 234–242.
Chandra, S., Paira, S., Alam, S. S., & Sanyal, G. (2014). A comparative survey of symmetric and asymmetric key cryptography. In 2014 international conference on electronics, communication and computational engineering (ICECCE) , IEEE, pp. 83–93.
Singh, K. K., & Dwivedi, S. (2014). Digital Watermarking using Asymmetric Key Cryptography and Spatial Domain Technique. International Journal of Advance Research in Computer Science and Management Studies, 2 (8), 1–15.
Google Scholar
Jirwan, N., Singh, A., & Vijay, S. (2013). Review and analysis of cryptography techniques. International Journal of Scientific and Engineering Research, 4 (3), 1–6.
Wang, X., Wang, X., Zhao, J., & Zhang, Z. (2011). Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dynamics, 63 (4), 587–597.
Article MathSciNet Google Scholar
Doz, Y. L., & Kosonen, M. (2010). Embedding strategic agility: A leadership agenda for accelerating business model renewal. Long range planning, 43 (2–3), 370–382.
Wu, S., Huang, J., Huang, D., & Shi, Y. Q. (2005). Efficiently self-synchronized audio watermarking for assured audio data transmission. IEEE Transactions on Broadcasting, 51 (1), 69–76.
Neumann, K., Herold, M., Hartley, A., & Schmullius, C. (2007). Comparative assessment of CORINE2000 and GLC2000: Spatial analysis of land cover data for Europe. International Journal of Applied Earth Observation and Geoinformation, 9 (4), 425–437.
Dulera, S., Jinwala, D., & Dasgupta, A. (2012). Experimenting with the novel approaches in text steganography. arXiv preprint arXiv:1203.3644 .
Thangadurai, K., & Devi, G. S. (2014). An analysis of LSB based image steganography techniques. In 2014 International Conference on Computer Communication and Informatics , IEEE, pp. 1–4.
Sun, Y., & Liu, F. (2010). Selecting cover for image steganography by correlation coefficient. In 2010 second international workshop on education technology and computer science , IEEE, vol. 2, pp. 159–162.
Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal processing, 90 (3), 727–752.
Amirtharajan, R., Akila, R., & Deepikachowdavarapu, P. (2010). A comparative analysis of image steganography. International journal of computer applications, 2 (3), 41–47.
Bhowal, K., Bhattacharyya, D., Jyoti Pal, A., & Kim, T. H. (2013). A GA based audio steganography with enhanced security. Telecommunication Systems, 52 (4), 2197–2204.
Nehru, G., & Dhar, P. (2012). A detailed look of audio steganography techniques using LSB and genetic algorithm approach. International Journal of Computer Science Issues (IJCSI), 9 (1), 402.
Kumar, S., Barnali, B. A. N. D. Y. O. P. A. D. H. Y. A. Y., & Banik, G. U. P. T. A. (2012). LSB modification and phase encoding technique of audio steganography revisited. International Journal of Advanced Research in Computer and Communication Engineering, 1 (4), 1–4.
Balgurgi, P. P., & Jagtap, S. K. (2013). Audio steganography used for secure data transmission. In Proceedings of international conference on advances in computing , Springer, New Delhi, pp. 699–706.
Matsuoka, H. (2006). Spread spectrum audio steganography using sub-band phase shifting. In 2006 International Conference on Intelligent Information Hiding and Multimedia , pp. 3–6. IEEE.
Jayaram, P., Ranganatha, H. R., & Anupama, H. S. (2011). Information hiding using audio steganography–a survey. The International Journal of Multimedia and Its Applications (IJMA), 3 , 86–96.
Mittal, A., Moorthy, A. K., & Bovik, A. C. (2012). No-reference image quality assessment in the spatial domain. IEEE Transactions on image processing, 21 (12), 4695–4708.
Article MathSciNet MATH Google Scholar
Ghobadi, A., Boroujerdizadeh, A., Yaribakht, A. H., & Karimi, R. (2013). Blind audio watermarking for tamper detection based on LSB. In 2013 15th international conference on advanced communications technology (ICACT) , IEEE, pp. 1077–1082.
Bhattacharyya, S., & Sanyal, G. (2012). Audio steganalysis of LSB audio using moments and multiple regression model. International Journal of Advances in Engineering and Technology, 3 (1), 145.
Zhao, Z., Liu, F., Luo, X., Xie, X., & Yu, L. (2012). LSB replacement steganography software detection based on model checking. In International workshop on digital watermarking Springer, Berlin, Heidelberg , pp. 54–68.
Sabeti, V., Samavi, S., Mahdavi, M., & Shirani, S. (2007). Steganalysis of pixel-value differencing steganographic method. In 2007 IEEE pacific rim conference on communications, computers and signal processing , IEEE, 292–295.
Gutub, A. A. A. (2010). Pixel indicator technique for RGB image steganography. Journal of emerging technologies in web intelligence, 2 (1), 56–64.
Gutub, A., Ankeer, M., Abu-Ghalioun, M., Shaheen, A., & Alvi, A. (2008). Pixel indicator high capacity technique for RGB image based Steganography.
Chang, C. L., & Girod, B. (2007). Direction-adaptive discrete wavelet transform for image compression. IEEE Transactions on Image Processing, 16 (5), 1289–1302.
Ghazali, K. H., Mansor, M. F., Mustafa, M. M., & Hussain, A. (2007). Feature extraction technique using discrete wavelet transform for image classification. In 2007 5th Student Conference on Research and Development , IEEE, pp. 1–4.
Lidong, H., Wei, Z., Jun, W., & Zebin, S. (2015). Combination of contrast limited adaptive histogram equalization and discrete wavelet transform for image enhancement. IET Image Processing, 9 (10), 908–915.
Naidu, V. P. S. (2012). Discrete cosine transform based image fusion techniques. Journal of Communication, Navigation and Signal Processing, 1 (1), 35–45.
Elharar, E., Stern, A., Hadar, O., & Javidi, B. (2007). A hybrid compression method for integral images using discrete wavelet transform and discrete cosine transform. Journal of display technology, 3 (3), 321–325.
Zeng, B., & Fu, J. (2008). Directional discrete cosine transforms—A new framework for image coding. IEEE transactions on circuits and systems for video technology, 18 (3), 305–313.
Alhayani, B. S., Hamid, N., Almukhtar, F. H., Alkawak, O. A., Mahajan, H. B., Kwekha-Rashid, A. S., & Alkhayyat, A. (2022). Optimized video Internet of things using elliptic curve cryptography based encryption and decryption. Computers and Electrical Engineering, 101 , 108022.
Huang, Y., Lei, Z., Song, Z., Guo, Y., & Li, Y. (2021). A Video Steganography Scheme Based on Post-Quantum Cryptography. In 2021 IEEE international conference on information communication and software engineering (ICICSE) , IEEE, pp. 83–87.
El-Shafai, W., Almomani, I. M., & Alkhayer, A. (2021). Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication. IEEE Access, 9 , 35004–35026.
Zhao, H., Liu, Y., Wang, Y., Liu, S., & Feng, C. (2021). A video steganography method based on transform block decision for H. 265/HEVC. IEEE Access, 9 , 55506–55521.
Chen, Y., Wang, H., Choo, K. K. R., He, P., Salcic, Z., Kaafar, M. A., & Zhang, X. (2021). DDCA: A distortion drift-based cost assignment method for adaptive video steganography in the transform domain. IEEE transactions on dependable and secure computing .
Suresh, M., & Sam, I. S. (2021). Exponential fractional cat swarm optimization for video steganography. Multimedia Tools and Applications, 80 (9), 13253–13270.
Keerthi, K., & Surendiran, B. (2017). Elliptic curve cryptography for secured text encryption. In 2017 International conference on circuit, power and computing technologies (ICCPCT) , IEEE, pp. 1–5.
Chauhan, S., Kumar, J., & Doegar, A. (2017). Multiple layer text security using variable block size cryptography and image steganography. In 2017 3rd international conference on computational intelligence and communication technology (CICT) , IEEE, 1–7.
Alkhudaydi, M., & Gutub, A. (2021). Securing data via cryptography and arabic text steganography. SN Computer Science, 2 (1), 1–18.
Al-Nofaie, S., Gutub, A., & Al-Ghamdi, M. (2021). Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. Journal of King Saud University-Computer and Information Sciences, 33 (8), 963–974.
Ahvanooey, M. T., Li, Q., Hou, J., Mazraeh, H. D., & Zhang, J. (2018). AITSteg: An innovative text steganography technique for hidden transmission of text message via social media. IEEE Access, 6 , 65981–65995.
Malik, A., Sikka, G., & Verma, H. K. (2017). A high capacity text steganography scheme based on LZW compression and color coding. Engineering Science and Technology, An International Journal, 20 (1), 72–79.
Sinha, N., Bhowmick, A., & Kishore, B. (2015). Encrypted information hiding using audio steganography and audio cryptography. International Journal of Computer Applications , 112 (5).
Socek, D., & Magliveras, S. S. (2005). General access structures in audio cryptography. In 2005 IEEE international conference on electro information technology IEEE , p. 6.
Lee, M. C., & Lau, C. Y. (2018). Three orders mixture algorithm of audio steganography combining cryptography. Journal of Information Hiding and Multimedia Signal Processing, 9 (4), 959–969.
Alhassan, S. (2021). Audio cryptography via enhanced genetic algorithm. The International Journal of Multimedia and Its Applications (IJMA), 13.
Ali, A. H., George, L. E., Zaidan, A. A., & Mokhtar, M. R. (2018). High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimedia Tools and Applications, 77 (23), 31487–31516.
Elkandoz, M. T., & Alexan, W. (2019). Logistic tan map based audio steganography. In 2019 international conference on electrical and computing technologies and applications (ICECTA), IEEE , pp. 1–5.
Hemeida, F., Alexan, W., & Mamdouh, S. (2019). Blowfish–secured audio steganography. In 2019 novel intelligent and leading emerging sciences conference (NILES) , IEEE, vol. 1, pp. 17–20.
Tayel, M., Gamal, A., & Shawky, H. (2016). A proposed implementation method of an audio steganography technique. In 2016 18th international conference on advanced communication technology (ICACT) , IEEE, pp. 180–184.
Kar, D. C., & Mulkey, C. J. (2015). A multi-threshold based audio steganography scheme. Journal of information security and applications, 23 , 54–67.
Al-Rahal, M. S., Abi Sen, A., & Basuhil, A. A. (2016). High level security based steganoraphy in image and audio files. Journal of theoretical and Applied Information Technology, 87 (1), 29.
Naskar, P. K., & Chaudhuri, A. (2014). A secure symmetric image encryption based on bit-wise operation. International Journal of Image, Graphics and Signal Processing, 6 (2), 30.
Kalubandi, V. K. P., Vaddi, H., Ramineni, V., & Loganathan, A. (2016). A novel image encryption algorithm using AES and visual cryptography. In 2016 2Nd international conference on next generation computing technologies (NGCT) , IEEE, pp. 808–813.
Ferdush, J., Begum, M., & Mahmood, A. (2017). A new image encryption technique combining the idea of one time pad with RGB value. International Journal of Computer Applications, 178 (5), 12–15.
Wang, X., Feng, L., & Zhao, H. (2019). Fast image encryption algorithm based on parallel computing system. Information Sciences, 486 , 340–358.
Li, C., Lin, D., Lü, J., & Hao, F. (2018). Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimedia, 25 (4), 46–56. https://doi.org/10.1109/MMUL.2018.2873472
Qazanfari, K., & Safabakhsh, R. (2014). A new steganography method which preserves histogram: Generalization of LSB++. Information Sciences, 277 , 90–101.
Yuan, H. D. (2014). Secret sharing with multi-cover adaptive steganography. Information Sciences, 254 , 197–212.
Muhammad, K., Ahmad, J., Rehman, N. U., Jan, Z., & Sajjad, M. (2017). CISSKA-LSB: Color image steganography using stego key-directed adaptive LSB substitution method. Multimedia Tools and Applications, 76 (6), 8597–8626.
Tavares, R., & Madeiro, F. (2016). Word-Hunt: A LSB steganography method with low expected number of modifications per pixel. IEEE Latin America Transactions, 14 (2), 1058–1064.
Nguyen, T. D., Arch-Int, S., & Arch-Int, N. (2016). An adaptive multi bit-plane image steganography using block data-hiding. Multimedia tools and applications, 75 (14), 8319–8345.
Download references
No funding is provided for the preparation of manuscript.
Author information
Authors and affiliations.
Vinayaka Mission’s Kirupananda Variyar Engineering College, Salem, Tamil Nadu, India
Fredy Varghese
Department of Computer Science, Naipunnya Institute of Management and Information Technology, Thrissur, Kerala, India
Department of Mathematics, Vinayaka Mission’s Kirupananda Variyar Engineering College, Salem, Tamil Nadu, India
P. Sasikala
You can also search for this author in PubMed Google Scholar
Contributions
All authors have equal contributions in this work.
Corresponding author
Correspondence to Fredy Varghese .
Ethics declarations
Conflict of interest.
Authors Fredy Varghese, P. Sasikala declares that they have no conflict of interest.
Ethical Approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Consent to Participate
All the authors involved have agreed to participate in this submitted article.
Consent to Publish
All the authors involved in this manuscript give full consent for publication of this submitted article.
Additional information
Publisher's note.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
Reprints and permissions
About this article
Varghese, F., Sasikala, P. A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography. Wireless Pers Commun 129 , 2291–2318 (2023). https://doi.org/10.1007/s11277-023-10183-z
Download citation
Accepted : 07 February 2023
Published : 27 March 2023
Issue Date : April 2023
DOI : https://doi.org/10.1007/s11277-023-10183-z
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
- Cryptography
- Steganography
- Advanced encryption standard (AES)
- Data hiding
- Find a journal
- Publish with us
- Track your research
A New Approach of Cryptography for Data Encryption and Decryption
Ieee account.
- Change Username/Password
- Update Address
Purchase Details
- Payment Options
- Order History
- View Purchased Documents
Profile Information
- Communications Preferences
- Profession and Education
- Technical Interests
- US & Canada: +1 800 678 4333
- Worldwide: +1 732 981 0060
- Contact & Support
- About IEEE Xplore
- Accessibility
- Terms of Use
- Nondiscrimination Policy
- Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
Help | Advanced Search
Computer Science > Cryptography and Security
Title: post quantum cryptography: techniques, challenges, standardization, and directions for future research.
Abstract: The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms. Grover's search algorithm gives a square root time boost for the searching of the key in symmetric schemes like AES and 3DES. The security of asymmetric algorithms like RSA, Diffie Hellman, and ECC is based on the mathematical hardness of prime factorization and discrete logarithm. The best classical algorithms available take exponential time. Shor's factoring algorithm can solve the problems in polynomial time. Major breakthroughs in quantum computing will render all the present-day widely used asymmetric cryptosystems insecure. This paper analyzes the vulnerability of the classical cryptosystems in the context of quantum computers discusses various post-quantum cryptosystem families, discusses the status of the NIST post-quantum cryptography standardization process, and finally provides a couple of future research directions in this field.
Submission history
Access paper:.
- Other Formats
References & Citations
- Google Scholar
- Semantic Scholar
DBLP - CS Bibliography
Bibtex formatted citation.
Bibliographic and Citation Tools
Code, data and media associated with this article, recommenders and search tools.
- Institution
arXivLabs: experimental projects with community collaborators
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.
Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .
IMAGES
VIDEO
COMMENTS
In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography) are ...
Cryptography is a tool to execute messages confidentiality. In Greek, the word "composing mystery" has a special meaning. The working cycle that changes through the actual message is called in plaintext as cypher text. The conversation loop, called scrambling, restores plaintext from the chip text [1] .
Cryptography is a technique that masks the. data over the channel of communication. Hiding the data to outsiders is an art. As the technology grows day by day, the need for data security over the ...
Cryptography, an international, peer-reviewed Open Access journal. ... Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and ...
A Review Paper on Cryptography Abstract: With the internet having reached a level that merges with our lives, growing explosively during the last several decades, data security has become a main concern for anyone connected to the web. Data security ensures that our data is only accessible by the intended receiver and prevents any modification ...
This paper will focus on the architectural aspects of KMS. The primary contributions of this research paper include: • Conduct a comprehensive literature survey of KMS systems. • Propose a novel taxonomy for the KMS methods. • Identify key requirements to envision KMS. • Explore research directions. The rest of the paper is organized as ...
Further, a detailed description of commonly using evaluations parameters for both steganography and cryptography, are given in this paper. Overall, this work is an attempt to create a better understanding of image steganography and its coupling with the encryption methods for developing state of art double layer security crypto-stego systems.
Existing review papers on the area only cover certain types of visual cryptography or lack comparisons between the various schemes. To address this gap, this paper provides broad overview of the area to aid new researchers in identifying research problems or to select suitable visual cryptography methods for their desired applications.
Cryptography is the study of assured communication procedure which allows only the sender and the intended person to review the message and the content shared. The simplest method used is the symmetric algorithm in which once the message is encrypted it is sent to the recipient along with its secret key. 2.
A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the ...
In this review paper, various cryptographic algorithms are compared with four types of cryptography methods, image data, video data, audio data and text data, for the secure transmission of data from one end to another end in the network. Cryptography has also provided reliable, robust networks strong and data security.
and provides future research directions in the eld of post-quantum cryptography. In 2018 Mavroeidis, et al. [4] published a paper to explain how quantum computing will a ect present-day cryptography. It mentioned 4 out of the 6 major post-quantum families and explained hash-based digital signatures in detail. This paper introduces and explains
Cryptography, an international, peer-reviewed Open Access journal. ... Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and ...
Cryptography is the solution to secure data from different security risks. To enhance the security of communication systems better cryptosystems technology is obvious in the area of cryptography. Our research focuses on data encryption and decryption technique for a better cryptosystem; where we have proposed a new approach that ensures better ...
Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions Mst Shapna Akter∗ ∗Department of Computer Science, Kennesaw State University, USA {∗ [email protected]} Abstract—With the ever-growing concern for internet secu- rity, the field of quantum cryptography emerges as a promis-
The aim of this paper is to develop a new approach to hiding a secret information in an image or audio or video, by taking advantage of benefits of combining cryptography and steganography. In ...
Keywords: Cryptography, Key Distribution, Key Management Service, Secret Handling. 1 Introduction The complexity and reliability of any cryptosystem is based on the use of crypto-graphic keys. The key exchange is one of the mechanisms at core of the process and it ensure confidentiality when exchanging information between users and its behaviour is
This paper discusses lightweight block ciphers, stream ciphers, and hybrid ciphers. The report evaluates security algorithms, comparing performance and robustness with the computational complexity of these techniques. The following research question we address through our study is in line with the research objective. 1) What is the need for the ...
Cryptography, an international, peer-reviewed Open Access journal. Next Issue Volume 7, June. ... Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future ...
Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data.
comparison table are used to compare all the techniques to get the performance of all the techniques. We are discussing research papers related to visual cryptography usage on different platforms like visual cryptography in cloud computing, networks, online detection systems, and banking transaction systems.
We conclude the paper with a discussion of these open problems and future research directions. General process of (k, n) visual cryptography. sual cryptography techniques covered in this paper.
The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms. Grover's search algorithm gives a square root time boost for the searching of the key in symmetric schemes like AES and 3DES. The security of asymmetric algorithms like RSA, Diffie Hellman, and ECC is based ...
This approach adheres to the principle of least privil ege, limiting access to critical key materials. By. using kernel-based key storage, this research se eks to enhance the security of sensitive ...
A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the ...