Peer-Reviewed Open Access Journal

International Journal of Communication Development

The International Journal of Communication Development (IJCD) is a new journal devoted to the analysis of communication, mass media and development in a global context in both Indian and...

ISSN: 2231-2498 Quarterly English Since 2011
Current Issue

Vol. 14 No. 3 (2024)

Articles Vol. 14 Issue 3 & 4 Jan - Jun 2024
DOI 10.65301/ijcd.2024.14.3.4

Stealth Passage: Encrypted Text Concealed with Hashing

Authors
130 Views
63 Downloads
Published 2024-06-30
Pages 43-50
Abstract

An innovative method of protecting confidential data is to hide it using encryption and decryption. In order to make the secret message disappear to the unaided eye, this encryption method embeds it into the visible text. When it comes to protecting data from unwanted access, the emergence of digital communication has made novel approaches necessary. One such approach is concealed text encryption. In order to better understand of concealed text encryption, this study examines the fundamental algorithms and approaches as well as their principles and methodologies. This text encryption makes certain that the encrypted communication is not revealed to uninvited parties by utilizing cryptography, the art of hiding information within other data. The content of the encrypted
file will disappear, which means no one can predict the information hiding behind the whitespace background, and it is very complex to decrypt the encrypted file. This method provides stronger security for our information than other methods of cryptography.

Keywords
Encryption Decryption Hashing Algorithm
References
  1. Al-Khedhairi et al., 2018. "Hybrid cryptosystem based on pseudo chaos of novel fractional order map and elliptic curves," Volume 8, pages 57733–57748, IEEE Access, 2020.B. Ge, X. Chen, G. Chen, and Z. Shen, "Secure and fast image encryption algorithm using vector operation and Hyper-Chaos-Based key generator," IEEE Access, vol. 9, pp. 137635–137654, 2021
  2. Z. Hua, Y. Zhou, C.-M. Pun, and C. L. P. Chen, "Image encryption using 2D logistic-sine chaotic map," in IEEE Int. Conf. Syst., Man, Cybern. (SMC), Oct. 2014, pp. 3229–3234.
  3. Ben Ge, X. Chen, G. Chen, and Z. Shen, "A secure and quick image encryption algorithm utilizing vector operation and a hyper-chaos-based key generator," IEEE Access, vol. 9, pp. 137635–137654, 2021.
  4. A review of text watermarking: theory, methods, and applications was published in IEEE Access in 2016 by NURUL SHAMIMI KAMARUDDIN, AMIRRUDIN KAMSIN, LIP YEE POR, and HAMEEDUR RAHMAN.
  5. M. G. Kuhn, R. J. Anderson, and F. A. P. Petitcolas, "Information hiding-A survey," Proc IEEE, vol. 87, no. 7, 1999, pp. 1062–1078).
  6. Kim, M.-Y. "Text watermarking by syntactic analysis," in Proc.12th WSEAS Int. Conf. Comput., 2008, p. 904.
  7. G. Sharma and D. Coumou, "Watermark synchronization: Perspectives and a new paradigm," in Proc. 40th Annu. Conf. Inf. Sci. Syst., 2006, pp. 1182–1187.
  8. Razam, Qazaim, Ahmed, Alturki, and Anwar, "Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes:Past and Present Status," IEEE Access, Identifier 10.1109/ACCESS.2021.3129224, 2021.
  9. T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel, "A survey of lightweight-cryptography implementations" IEEE Desktop.
✓ Citation copied to clipboard