The work showed the possibility of accepting security of 1-LSB, 2-LSB, and 3-LSB methods and their reasonable effect on the cover. The results gave enhancement in capacity versus security trade-off, allowing the user and application to be the decision maker in the choice. The experimentations covered securing data within 15 differently sized audios showing interesting results. The study modeled the system and implemented it to be tested to explore the relation between security, capacity, and data dependency. The system security is generated by involving RSA cryptography followed by audio-based steganography as two sequential layers to ensure the best possible security gaining the advantages from both. ![]() This paper proposed an enhanced system for securing sensitive text data on personal computer benefitting from the combination of both techniques: cryptography and steganography.
0 Comments
Leave a Reply. |