Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/2436
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAlhassan, J. K.-
dc.contributor.authorIsmaila, Idris-
dc.contributor.authorWaziri, Victor O.-
dc.contributor.authorAbdulkadir, Adamu-
dc.date.accessioned2021-06-09T19:14:30Z-
dc.date.available2021-06-09T19:14:30Z-
dc.date.issued2016-11-
dc.identifier.issn2545-5192-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/2436-
dc.description.abstractThe rate at which encrypted messages are being sent over the internet and other electronic means will easily capture the attention of hackers and possibly make them try to disrupt or even hack those messages so as view the original message. Steganography is designed to hide the presence of a message by hiding the secret message inside an innocent file. For effective security, steganography is sometimes combined with cryptography. In this paper, steganography and cryptography are combined to provide a robust system capable of encrypting a secret message using RSA algorithm. To hide the message, advanced LSB method is used. The original message is encrypted at the initial stage and then separated into two portions P1 and P2. An XOR operation is applied to the first portion (P1) using the odd location and to the second portion (P2) using the even position of the LSB+1.The Position of the LSB is then used to hide the XORed encrypted message.en_US
dc.language.isoenen_US
dc.publisherInternational Conference on Information and Communication Technology and its Applicationsen_US
dc.subjectcryptography; RSA algorithm; steganography; Least Significant Biten_US
dc.titleA Secure Method to Hide Confidential Data Using Cryptography and Steganographyen_US
dc.typeArticleen_US
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
A Secure Method to Hide Confidential Data Using Cryptography and.pdf590.89 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.