Data hiding by using AES Algorithm

Authors

  • Prof. Dr.Rafidah Mohamad Faculty of Computer Science and Information Systems, Universiti Malaya (UM),Malaysia

DOI:

https://doi.org/10.31185/wjcm.82

Keywords:

Data hiding, AES, encryption, decryption

Abstract

Data hiding is the art of hiding data for various purposes such as; to maintain private data, secure confidential data and so on. Securely exchange the data over the internet network is very important issue. So, in order to transfer the data securely to the destination, there are many approaches like cryptography and steganography. In this research we propose an AES algorithm for embedding the data into the images which is implemented through the Microsoft .NET framework using the C#.NET.

Downloads

Download data is not yet available.

References

R. Ibrahim and T. S. Kuan, “Steganography Imaging System (SIS): Hiding Secret Message inside an Image.” http://www.iaeng.org/publication/WCECS2010/WCECS2010_pp144-148.pdf.

Z. Kh, A. A. Al-Ani, B. B. Zaidan, Zaidan, O. Hamdan, and Alanazi, “Overview: Main Fundamentals for Steganography.” http://arxiv.org/ftp/arxiv/papers/1003/1003.4086.pd.

S. B. Sachin, “User Aware Image Tag Refinement.” http://www.ijcsmr.org/eetecme2013/paper19.pdf.

Y. Bassil, “A Simulation Model for the Waterfall Software Development Life Cycle,” 2011. http://arxiv.org/ftp/arxiv/papers/1205/1205.6904.pdf.

A. F. Neamah, “Adoption of Data Warehouse in University Management: Wasit University Case Study,” Journal of Physics: Conference Series, vol. 1860, pp. 12027–12027, 2021.

A. F. Neamah and M. K. Ghani, “Adoption of E-Health records management model in health sector of Iraq,” Indian Journal of Science and Technology, vol. 11, no. 30, pp. 1–20, 2018.

D. S. L. Vie, “Understanding Data Flow Diagrams.” http://ratandon.mysite.syr.edu/cis453/notes/DFD_over_Flowcharts.pdf.

B. Beizer, “Software testing techniques,” International Thompson Computer Press, 1990.

B. Beizer. New York: John Wiley & Sons, Inc, 1995.

Downloads

Published

2022-12-30

Issue

Section

Computer

How to Cite

[1]
Prof. Dr.Rafidah Mohamad, “Data hiding by using AES Algorithm”, WJCMS, vol. 1, no. 4, pp. 72–77, Dec. 2022, doi: 10.31185/wjcm.82.