A Novel Security Scheme based on Twofish and Discrete Wavelet Transform

Abstract

Nowadays, there is a huge amount of data exchanged between different users; the security of the exchanged data has become a significant problem due to the existing of several security attacks. So, to increase the confidence of users several security techniques can be used together to enhance the level of security. In this research paper a new secure system is proposed. The proposed system employs cryptography and steganography together. The combination between cryptography and steganography contributes in increasing the security level to provide a robust system that can resist the security attacks. In this paper, the Twofish block cipher based cryptography is employed to encrypt the data. The Twofish permits trade-offs between speed, key setup time, software size, memory, and security level. The steganographic algorithm employed to hide the encrypted data into an image is the discrete wavelet transforms (DWT) algorithm. Different security tests are used to evaluate the security and functionality of the suggested algorithm, such as, the peak signal to noise ratio (PSNR) analysis and histogram analysis. The results reveal that, the algorithm proposed in this paper is secure.

Authors and Affiliations

Mohammad S. Saraireh

Keywords

Related Articles

Fuzzy Logic Driven Expert System for the Assessment of Software Projects Risk

This paper presents an expert risk evaluation system developed and based on up-to-date empirical study that uses a real data from huge number of software projects to identify the most factors that affect the project succ...

Fault-Tolerant Attitude Control System for a Spacecraft with Control Moment Gyros Using Multi-Objective Optimization

Recent years have seen a growing requirement for accurate and agile attitude control of spacecraft. To both quickly and accurately control the attitude of a spacecraft, Control Moment Gyros (CMGs) which can generate much...

A Short Review of Gender Classification based on Fingerprint using Wavelet Transform

In some cases, knowing the gender of fingerprint owner found in criminal or disaster scene is advantageous. Theoretically, if the number of the male and female fingerprints in a database is equal, then the identification...

Cryptic Mining in Light of Artificial Intelligence

The analysis of cryptic text is hard problem”, and there is no fixed algorithm for generating plain-text from cipher text. Human brains do this intelligently. The intelligent cryptic analysis process needs learning algor...

Dist-Coop: Distributed Cooperative Transmission in UWSNs using Optimization Congestion Control and Opportunistic Routing

One of the real issues in UWSN is congestion control. The need is to plan an optimized congestion control scheme which enhances the network life time and in addition limits the usage of energy in data transmission from s...

Download PDF file
  • EP ID EP258803
  • DOI 10.14569/IJACSA.2017.080544
  • Views 104
  • Downloads 0

How To Cite

Mohammad S. Saraireh (2017). A Novel Security Scheme based on Twofish and Discrete Wavelet Transform. International Journal of Advanced Computer Science & Applications, 8(5), 358-364. https://europub.co.uk./articles/-A-258803