This paper is published in Volume-9, Issue-2, 2023
Area
Cyber Security
Author
Ibraheem Ojelade, Ibrahim Abdulkareem
Org/Univ
Austin Peay State University, Clarksville, USA, USA
Keywords
ECC, RGB, LSB, CNOT Gate, PSNR, Steganography, and Cryptography
Citations
IEEE
Ibraheem Ojelade, Ibrahim Abdulkareem. Data encryption on image cryptography and steganography, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Ibraheem Ojelade, Ibrahim Abdulkareem (2023). Data encryption on image cryptography and steganography. International Journal of Advance Research, Ideas and Innovations in Technology, 9(2) www.IJARIIT.com.
MLA
Ibraheem Ojelade, Ibrahim Abdulkareem. "Data encryption on image cryptography and steganography." International Journal of Advance Research, Ideas and Innovations in Technology 9.2 (2023). www.IJARIIT.com.
Ibraheem Ojelade, Ibrahim Abdulkareem. Data encryption on image cryptography and steganography, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Ibraheem Ojelade, Ibrahim Abdulkareem (2023). Data encryption on image cryptography and steganography. International Journal of Advance Research, Ideas and Innovations in Technology, 9(2) www.IJARIIT.com.
MLA
Ibraheem Ojelade, Ibrahim Abdulkareem. "Data encryption on image cryptography and steganography." International Journal of Advance Research, Ideas and Innovations in Technology 9.2 (2023). www.IJARIIT.com.
Abstract
These days, information is transmitted via the internet. Consequently, information security has emerged as a crucial concern. The well-known method of network data security is cryptography. In digital media, steganography is the method used to conceal the message. Comparatively speaking, the security of elliptical curve cryptography outweighs that of the ones currently in use. In this paper, a hybrid model that combines steganography and ECC with public keys is presented. can offer higher levels of higher security than steganographic or one ECC method alone. This initiative's primary goal is to conceal sensitive data from internet users, the military, and various corporate sectors that commonly use public networks for interaction