Review on secured data capabilities of cryptography, steganography, and watermarking domain

Due to the increment of using Internet to transfer the critical and secret data, many studies interested in secured data and investigated many ways to secure the transferred information. This paper presents a review study on the field that used in a secured data domain. The main objective of this st...

Full description

Saved in:
Bibliographic Details
Main Authors: Al-Yousuf, Farah Qasim Ahmed (Author), Din, Roshidi (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2020-02-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Due to the increment of using Internet to transfer the critical and secret data, many studies interested in secured data and investigated many ways to secure the transferred information. This paper presents a review study on the field that used in a secured data domain. The main objective of this study is explore the capabilities of secured data that used widely by researchers. Furthermore, the benefits and the drawbacks for each of secured data domain are also studied. This paper concludes that cryptography techniques could be utilized with steganography and watermarking in secured data domain to enhance the security mechanisms.
Item Description:https://ijeecs.iaescore.com/index.php/IJEECS/article/view/20610