Review on secured data capabilities of cryptography, steganography, and watermarking domain
Due to the increment of using Internet to transfer the critical and secret data, many studies interested in secured data and investigated many ways to secure the transferred information. This paper presents a review study on the field that used in a secured data domain. The main objective of this st...
Saved in:
Main Authors: | , |
---|---|
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2020-02-01.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 01889 am a22003013u 4500 | ||
---|---|---|---|
001 | ijeecs20610_13469 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Al-Yousuf, Farah Qasim Ahmed |e author |
100 | 1 | 0 | |e contributor |
700 | 1 | 0 | |a Din, Roshidi |e author |
245 | 0 | 0 | |a Review on secured data capabilities of cryptography, steganography, and watermarking domain |
260 | |b Institute of Advanced Engineering and Science, |c 2020-02-01. | ||
500 | |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/20610 | ||
520 | |a Due to the increment of using Internet to transfer the critical and secret data, many studies interested in secured data and investigated many ways to secure the transferred information. This paper presents a review study on the field that used in a secured data domain. The main objective of this study is explore the capabilities of secured data that used widely by researchers. Furthermore, the benefits and the drawbacks for each of secured data domain are also studied. This paper concludes that cryptography techniques could be utilized with steganography and watermarking in secured data domain to enhance the security mechanisms. | ||
540 | |a Copyright (c) 2019 Institute of Advanced Engineering and Science | ||
540 | |a http://creativecommons.org/licenses/by-nc/4.0 | ||
546 | |a eng | ||
690 | |||
690 | |a Secured data, Technique used, Algorithm used | ||
655 | 7 | |a info:eu-repo/semantics/article |2 local | |
655 | 7 | |a info:eu-repo/semantics/publishedVersion |2 local | |
655 | 7 | |2 local | |
786 | 0 | |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 17, No 2: February 2020; 1053-1058 | |
786 | 0 | |n 2502-4760 | |
786 | 0 | |n 2502-4752 | |
786 | 0 | |n 10.11591/ijeecs.v17.i2 | |
787 | 0 | |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/20610/13469 | |
856 | 4 | 1 | |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/20610/13469 |z Get fulltext |