An innovative method of protecting confidential data is to hide it using encryption and decryption. In order to make the secret message disappear to the unaided eye, this encryption method embeds it into the visible text. When it comes to protecting data from unwanted access, the emergence of digital communication has made novel approaches necessary. One such approach is concealed text encryption. In order to better understand of concealed text encryption, this study examines the fundamental algorithms and approaches as well as their principles and methodologies. This text encryption makes certain that the encrypted communication is not revealed to uninvited parties by utilizing cryptography, the art of hiding information within other data. The content of the encrypted
file will disappear, which means no one can predict the information hiding behind the whitespace background, and it is very complex to decrypt the encrypted file. This method provides stronger security for our information than other methods of cryptography.
Stealth Passage: Encrypted Text Concealed with Hashing
130 Views
63 Downloads
Published 2024-06-30
Pages 43-50
Abstract
Keywords
Encryption
Decryption
Hashing Algorithm
References
- Al-Khedhairi et al., 2018. "Hybrid cryptosystem based on pseudo chaos of novel fractional order map and elliptic curves," Volume 8, pages 57733–57748, IEEE Access, 2020.B. Ge, X. Chen, G. Chen, and Z. Shen, "Secure and fast image encryption algorithm using vector operation and Hyper-Chaos-Based key generator," IEEE Access, vol. 9, pp. 137635–137654, 2021
- Z. Hua, Y. Zhou, C.-M. Pun, and C. L. P. Chen, "Image encryption using 2D logistic-sine chaotic map," in IEEE Int. Conf. Syst., Man, Cybern. (SMC), Oct. 2014, pp. 3229–3234.
- Ben Ge, X. Chen, G. Chen, and Z. Shen, "A secure and quick image encryption algorithm utilizing vector operation and a hyper-chaos-based key generator," IEEE Access, vol. 9, pp. 137635–137654, 2021.
- A review of text watermarking: theory, methods, and applications was published in IEEE Access in 2016 by NURUL SHAMIMI KAMARUDDIN, AMIRRUDIN KAMSIN, LIP YEE POR, and HAMEEDUR RAHMAN.
- M. G. Kuhn, R. J. Anderson, and F. A. P. Petitcolas, "Information hiding-A survey," Proc IEEE, vol. 87, no. 7, 1999, pp. 1062–1078).
- Kim, M.-Y. "Text watermarking by syntactic analysis," in Proc.12th WSEAS Int. Conf. Comput., 2008, p. 904.
- G. Sharma and D. Coumou, "Watermark synchronization: Perspectives and a new paradigm," in Proc. 40th Annu. Conf. Inf. Sci. Syst., 2006, pp. 1182–1187.
- Razam, Qazaim, Ahmed, Alturki, and Anwar, "Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes:Past and Present Status," IEEE Access, Identifier 10.1109/ACCESS.2021.3129224, 2021.
- T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel, "A survey of lightweight-cryptography implementations" IEEE Desktop.
✓ Citation copied to clipboard
