Data Security in Cloud Computing Using Steganography: A Review

被引:0
作者
AlKhamese, Aya Y. [1 ]
Shabana, Wafaa R. [1 ]
Hanafy, Ibrahim M. [2 ]
机构
[1] Port Said Univ, Fac Engn, Dept Phys & Engn Math, Port Said, Egypt
[2] Port Said Univ, Fac Sci, Dept Math & Comp Sci, Port Said, Egypt
来源
PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN COMPUTER ENGINEERING (ITCE 2019) | 2019年
关键词
Cloud Computing; Steganogrphy; Cryptography; LSB; DCT; information hiding;
D O I
10.1109/itce.2019.8646434
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is one of the largest developments in the field of information technology during recent years. It is a service oriented computing which offers everything as a service via the internet by the pay-as-you-go model. It becomes more desirable for all organizations (such as education, banking, healthcare and manufacturing) and also for personal use as it provides a flexible, scalable, and reliable infrastructure and services. For the user, the most important issue is to store, retrieve and transmit the data over the cloud network and storage in a secure manner. Steganography and cryptography are some of the security techniques applied in the cloud to secure the user data transmitting. The objective of steganography is to hide the existence of communication from the unintended users; whereas cryptography encrypts the data to make it more secure. Steganography is considered as the most effective technique for securing the communication in the cloud. Digital images are most commonly used as a cover medium in steganography. In the literature, there exist several image steganography techniques for hiding information in images; which were developed and implemented in the time domain as well as in the frequency domain. Fundamentals of spatial domain and frequency domain techniques are reviewed in this paper with emphasis on the Least Significant Bit (LSB) and the Discrete Cosine Transform (DCT) techniques.
引用
收藏
页码:549 / 558
页数:10
相关论文
共 47 条
[1]  
Abdul-Gabbar, 2015, INT J COMPUTER SCI I, V13
[2]  
Adamu Ismail Abdulkarim, 2018, INT J SOFTWARE ENG A, V9
[3]  
Akhil P V, 2013, INT J SCI RES DEV IJ, V1
[4]  
Al-asadi Tawfiq A., 2015, INT J DIGITAL CONTEN, V9, P78
[5]  
Alghamdi Abdulrahman Abdullah, 2018, INT J ADV COMPUTER S, V9
[6]  
Ali Abdelmgeid Amin, 2013, INT J IMAGE PROCESSI, V7, P81
[7]  
Alvi Aleem Khalid, 2013, IMAGE STEGANOGRAPHY, p[277, 282]
[8]  
Arya Anupriya, 2018, INT J FUTURE REVOLUT, V4, P143
[9]  
Attaby Abdelhamid Awad., 2017, Ain Shams Engineering Journal
[10]  
Avi Kumar R, 2016, J WEB DEV WEB DESIGN, V1, P1