ARCHIVES

Research Article

Review on RSA Cryptography, Steganography and Compression Techniques for Data Security

P. Jeno Paul1 M I Thaslima2
1Professor, EEE Department, ASIET, Kalady, Kerala, India. 2PG Student, CSE Department, ASIET, Kalady, Kerala, India.

Published Online: January-April 2024

Pages: 17-21

Cite this article

No DOI

References

1. A. Sari, G. Ardiansyah, and E. H. Rachmawanto, ‘‘An improved security and message capacity using AES and Huffman coding on image
steganography,’’ Telkomnika, vol. 17, no. 5, pp. 2400–2409, 2019.
2. O. F. AbdelWahab, A. I. Hussein, H. F. A. Hamed, and H. M. Kelash, ‘‘Hiding data in images using steganography techniques with
compression algorithms,’’ Telkomnika, vol. 17, no. 3, pp. 1168– 1175, 2019.
3. N. Sharma and U. Batra, ‘‘Performance analysis of compression algorithms for information security: A review,’’ ICST Trans. Scalable
Inf. Syst., vol. 7, no. 27,Jul. 2018, Art. no. 163503.
4. R. L. Rivest, A. Shamir, and L. Adleman, ‘‘A method for obtaining digital signatures and public-keycryptosystems,’’ Commun. ACM, vol.
21, no. 2, pp. 120–126, Feb. 1978.
5. R. M. Thanki and A. Kothari, ‘‘Data compression and its application in medical imaging,’’ in Hybrid and Advanced Compression
Techniques for Medical Images. Cham, Switzerland: Springer, 2019, pp. 1–15.
6. Jeromel and B. Žalik, ‘‘An efficient lossy cartoon image compression method,’’ Multimedia Tools Appl., vol. 79, nos. 1–2, pp. 433–451,
Jan. 2020.
7. F. Adhanadi, L. Novamizanti, and G. Budiman, ‘‘DWT-SMM-based audio steganography with RSA encryption and compressive
sampling,’’ Telkomnika, vol. 18, no. 2, pp. 1095–1104, 2020.
8. R. Praisline Jasmi, B. Perumal, and M. Pallikonda Rajasekaran, ‘‘Comparison of image compression techniques using Huffman coding,
DWT and fractal algorithm,’’ in Proc. Int. Conf. Comput. Commun. Informat. (ICCCI), Jan. 2015, pp. 1–5.
9. Setyaningsih, R. Wardoyo, and A. K. Sari, ‘‘Securing color image transmission using compression-encryption model with dynamic key
generator and efficient symmetric key distribution,’’ Digit. Commun. Netw., vol. 6, no. 4, pp. 486–503, Nov.2020.
10. M. Y. Valandar, P. Ayubi, and M. J. Barani, ‘‘A new transform domain steganography based on modified logistic chaotic map for color
images,’’J. Inf. Secur. Appl., vol. 34, pp. 142–151, Jun. 2017.

Related Articles

2024

Revolutionizing User Interfaces: Exploring the Latest Trends in Front-End Development

2024

Website Development in Computer Science: Unveiling the Digital World

2024

Stock Price Prediction Using LSTM

2024

Comparative Analysis of Program Execution Time Required by Python, R and Julia Compiler

2024

Online Auction App

2024

Digital Transformation in Tailoring:Thread Express Application

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/review-on-rsa-cryptography-steganography-and-compression-techniques-for-data-security

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.