ARCHIVES
Research Article
Review on RSA Cryptography, Steganography and Compression Techniques for Data Security
P. Jeno Paul1
M I Thaslima2
1Professor, EEE Department, ASIET, Kalady, Kerala, India. 2PG Student, CSE Department, ASIET, Kalady, Kerala, India.
Published Online: January-April 2024
Pages: 17-21
Cite this article
No DOIReferences
1. A. Sari, G. Ardiansyah, and E. H. Rachmawanto, ‘‘An improved security and message capacity using AES and Huffman coding on image
steganography,’’ Telkomnika, vol. 17, no. 5, pp. 2400–2409, 2019.
2. O. F. AbdelWahab, A. I. Hussein, H. F. A. Hamed, and H. M. Kelash, ‘‘Hiding data in images using steganography techniques with
compression algorithms,’’ Telkomnika, vol. 17, no. 3, pp. 1168– 1175, 2019.
3. N. Sharma and U. Batra, ‘‘Performance analysis of compression algorithms for information security: A review,’’ ICST Trans. Scalable
Inf. Syst., vol. 7, no. 27,Jul. 2018, Art. no. 163503.
4. R. L. Rivest, A. Shamir, and L. Adleman, ‘‘A method for obtaining digital signatures and public-keycryptosystems,’’ Commun. ACM, vol.
21, no. 2, pp. 120–126, Feb. 1978.
5. R. M. Thanki and A. Kothari, ‘‘Data compression and its application in medical imaging,’’ in Hybrid and Advanced Compression
Techniques for Medical Images. Cham, Switzerland: Springer, 2019, pp. 1–15.
6. Jeromel and B. Žalik, ‘‘An efficient lossy cartoon image compression method,’’ Multimedia Tools Appl., vol. 79, nos. 1–2, pp. 433–451,
Jan. 2020.
7. F. Adhanadi, L. Novamizanti, and G. Budiman, ‘‘DWT-SMM-based audio steganography with RSA encryption and compressive
sampling,’’ Telkomnika, vol. 18, no. 2, pp. 1095–1104, 2020.
8. R. Praisline Jasmi, B. Perumal, and M. Pallikonda Rajasekaran, ‘‘Comparison of image compression techniques using Huffman coding,
DWT and fractal algorithm,’’ in Proc. Int. Conf. Comput. Commun. Informat. (ICCCI), Jan. 2015, pp. 1–5.
9. Setyaningsih, R. Wardoyo, and A. K. Sari, ‘‘Securing color image transmission using compression-encryption model with dynamic key
generator and efficient symmetric key distribution,’’ Digit. Commun. Netw., vol. 6, no. 4, pp. 486–503, Nov.2020.
10. M. Y. Valandar, P. Ayubi, and M. J. Barani, ‘‘A new transform domain steganography based on modified logistic chaotic map for color
images,’’J. Inf. Secur. Appl., vol. 34, pp. 142–151, Jun. 2017.
steganography,’’ Telkomnika, vol. 17, no. 5, pp. 2400–2409, 2019.
2. O. F. AbdelWahab, A. I. Hussein, H. F. A. Hamed, and H. M. Kelash, ‘‘Hiding data in images using steganography techniques with
compression algorithms,’’ Telkomnika, vol. 17, no. 3, pp. 1168– 1175, 2019.
3. N. Sharma and U. Batra, ‘‘Performance analysis of compression algorithms for information security: A review,’’ ICST Trans. Scalable
Inf. Syst., vol. 7, no. 27,Jul. 2018, Art. no. 163503.
4. R. L. Rivest, A. Shamir, and L. Adleman, ‘‘A method for obtaining digital signatures and public-keycryptosystems,’’ Commun. ACM, vol.
21, no. 2, pp. 120–126, Feb. 1978.
5. R. M. Thanki and A. Kothari, ‘‘Data compression and its application in medical imaging,’’ in Hybrid and Advanced Compression
Techniques for Medical Images. Cham, Switzerland: Springer, 2019, pp. 1–15.
6. Jeromel and B. Žalik, ‘‘An efficient lossy cartoon image compression method,’’ Multimedia Tools Appl., vol. 79, nos. 1–2, pp. 433–451,
Jan. 2020.
7. F. Adhanadi, L. Novamizanti, and G. Budiman, ‘‘DWT-SMM-based audio steganography with RSA encryption and compressive
sampling,’’ Telkomnika, vol. 18, no. 2, pp. 1095–1104, 2020.
8. R. Praisline Jasmi, B. Perumal, and M. Pallikonda Rajasekaran, ‘‘Comparison of image compression techniques using Huffman coding,
DWT and fractal algorithm,’’ in Proc. Int. Conf. Comput. Commun. Informat. (ICCCI), Jan. 2015, pp. 1–5.
9. Setyaningsih, R. Wardoyo, and A. K. Sari, ‘‘Securing color image transmission using compression-encryption model with dynamic key
generator and efficient symmetric key distribution,’’ Digit. Commun. Netw., vol. 6, no. 4, pp. 486–503, Nov.2020.
10. M. Y. Valandar, P. Ayubi, and M. J. Barani, ‘‘A new transform domain steganography based on modified logistic chaotic map for color
images,’’J. Inf. Secur. Appl., vol. 34, pp. 142–151, Jun. 2017.
Related Articles
2024
Revolutionizing User Interfaces: Exploring the Latest Trends in Front-End Development
2024
Website Development in Computer Science: Unveiling the Digital World
2024
Stock Price Prediction Using LSTM
2024
Comparative Analysis of Program Execution Time Required by Python, R and Julia Compiler
2024
Online Auction App
2024