A Novel Security Scheme based on Twofish and Discrete Wavelet Transform
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 5
Abstract
Nowadays, there is a huge amount of data exchanged between different users; the security of the exchanged data has become a significant problem due to the existing of several security attacks. So, to increase the confidence of users several security techniques can be used together to enhance the level of security. In this research paper a new secure system is proposed. The proposed system employs cryptography and steganography together. The combination between cryptography and steganography contributes in increasing the security level to provide a robust system that can resist the security attacks. In this paper, the Twofish block cipher based cryptography is employed to encrypt the data. The Twofish permits trade-offs between speed, key setup time, software size, memory, and security level. The steganographic algorithm employed to hide the encrypted data into an image is the discrete wavelet transforms (DWT) algorithm. Different security tests are used to evaluate the security and functionality of the suggested algorithm, such as, the peak signal to noise ratio (PSNR) analysis and histogram analysis. The results reveal that, the algorithm proposed in this paper is secure.
Authors and Affiliations
Mohammad S. Saraireh
Fuzzy Logic Driven Expert System for the Assessment of Software Projects Risk
This paper presents an expert risk evaluation system developed and based on up-to-date empirical study that uses a real data from huge number of software projects to identify the most factors that affect the project succ...
Fault-Tolerant Attitude Control System for a Spacecraft with Control Moment Gyros Using Multi-Objective Optimization
Recent years have seen a growing requirement for accurate and agile attitude control of spacecraft. To both quickly and accurately control the attitude of a spacecraft, Control Moment Gyros (CMGs) which can generate much...
A Short Review of Gender Classification based on Fingerprint using Wavelet Transform
In some cases, knowing the gender of fingerprint owner found in criminal or disaster scene is advantageous. Theoretically, if the number of the male and female fingerprints in a database is equal, then the identification...
Cryptic Mining in Light of Artificial Intelligence
The analysis of cryptic text is hard problem”, and there is no fixed algorithm for generating plain-text from cipher text. Human brains do this intelligently. The intelligent cryptic analysis process needs learning algor...
Dist-Coop: Distributed Cooperative Transmission in UWSNs using Optimization Congestion Control and Opportunistic Routing
One of the real issues in UWSN is congestion control. The need is to plan an optimized congestion control scheme which enhances the network life time and in addition limits the usage of energy in data transmission from s...