A Novel Security Scheme based on Twofish and Discrete Wavelet Transform
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 5
Abstract
Nowadays, there is a huge amount of data exchanged between different users; the security of the exchanged data has become a significant problem due to the existing of several security attacks. So, to increase the confidence of users several security techniques can be used together to enhance the level of security. In this research paper a new secure system is proposed. The proposed system employs cryptography and steganography together. The combination between cryptography and steganography contributes in increasing the security level to provide a robust system that can resist the security attacks. In this paper, the Twofish block cipher based cryptography is employed to encrypt the data. The Twofish permits trade-offs between speed, key setup time, software size, memory, and security level. The steganographic algorithm employed to hide the encrypted data into an image is the discrete wavelet transforms (DWT) algorithm. Different security tests are used to evaluate the security and functionality of the suggested algorithm, such as, the peak signal to noise ratio (PSNR) analysis and histogram analysis. The results reveal that, the algorithm proposed in this paper is secure.
Authors and Affiliations
Mohammad S. Saraireh
An Incremental Technique of Improving Translation
Statistical machine translation (SMT) refers to using probabilistic methods of learning translation process primarily from the parallel text. In SMT, the linguistic information such as morphology and syntax can be added...
Effective Data Mining Technique for Classification Cancers via Mutations in Gene using Neural Network
The prediction plays the important role in detecting efficient protection and therapy/treatment of cancer. The prediction of mutations in gene needs a diagnostic and classification, which is based on the whole database (...
Dynamic Clustering for Information Retrieval from Big Data Depending on Compressed Files
The rapid growth in the database data led to origination a large amount of data. So, it is still a big problem to access this data for answering user queries. In this paper a novel approach for aggregating the required d...
AdviseMe: An Intelligent Web-Based Application for Academic Advising
The traditional academic advising process in many tertiary-level institutions today possess significant inefficiencies, which often account for high levels of student dissatisfaction. Common issues include high student-a...
Frequency Domain Analysis for Assessing Fluid Responsiveness by Using Instantaneous Pulse Rate Variability
In the ICU, fluid therapy is conventional strategy for the patient in shock. However, only half of ICU patients have well-responses to fluid therapy, and fluid loading in non-responsive patient delays definitive therapy....