European Journal of Computer Science and Information Technology (EJCSIT)

EA Journals

Steganography

A Framework for Security of Data in Telemedicine (Published)

One of the challenges of telemedicine as observed in the literature is the issue of insecurity of data. This has come with its attendant lack of confidentiality and data integrity, the attributes most needed in medical records. An attempt to proffer solution to this problem is in the design of a framework comprising Rivest, Shamir and Adleman (RSA) cipher combined with the F4 frequency domain steganography algorithm. The framework is demonstrated with a simulated scenario. Complicated though this integration seems to be, the foolproof security offered outweighs the computational complexity.

Keywords: Confidentiality, Cryptography, F4, Integrity, RSA, Security, Steganography, telemedicine

New Study of Watermarking Techniques for Digital Products with an Emphasis on Watermarking Techniques for Digital Images (Published)

In recent years, the significant growth of computer networks has facilitated the publication of multimedia data such as images, video, audio, etc. Digital images can be easily copied and published in the internet without the owner’s consent. There are several ways to prevent these problems; one of these methods is digital watermarking. In these methods, a watermark that can be trade mark, digital signature, and so on is inserted into the image, and the watermarked image is obtained. This image can then be published. Therefore, the image’s owner can prove a suspicious image by retrieving the watermark from watermarked image. The main objective of watermarking of digital images is to insert the watermark information in digital content as invisible and usually robust. Digital watermarking consists of two watermark insertion and extraction stages. In insertion stage, watermark is embedded in the host image and the watermarked image is obtained. In the extraction stage, watermark is extracted from the image. There are different classifications for different methods of digital watermarking. This paper studies the basic concepts of watermarking and its classifications, and at the end, common uses of watermarking are discussed.

Keywords: Fragile, Robust, Steganography, Watermarking Applications., Watermarking System

Scroll to Top

Don't miss any Call For Paper update from EA Journals

Fill up the form below and get notified everytime we call for new submissions for our journals.