A Secure Data Communication System Using Cryptogaphy And Steganography

Article Properties
Cite
Saraireh, Saleh. “A Secure Data Communication System Using Cryptogaphy And Steganography”. International Journal of Computer Networks &Amp; Communications, vol. 5, no. 3, 2013, pp. 125-37, https://doi.org/10.5121/ijcnc.2013.5310.
Saraireh, S. (2013). A Secure Data Communication System Using Cryptogaphy And Steganography. International Journal of Computer Networks &Amp; Communications, 5(3), 125-137. https://doi.org/10.5121/ijcnc.2013.5310
Saraireh, Saleh. “A Secure Data Communication System Using Cryptogaphy And Steganography”. International Journal of Computer Networks &Amp; Communications 5, no. 3 (2013): 125-37. https://doi.org/10.5121/ijcnc.2013.5310.
Saraireh S. A Secure Data Communication System Using Cryptogaphy And Steganography. International journal of Computer Networks & Communications. 2013;5(3):125-37.
Citations
Title Journal Journal Categories Citations Publication Date
Lightweight Encryption Assisted Man-in-The-Middle Attack-Resilient Steganography Model for Secure Satellite Imagery Services: LEMARS

Journal of Intelligent & Fuzzy Systems
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Technology: Mechanical engineering and machinery
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
2023
Reseed Skipping of Linear Congruential Generator for Multi-level Image Steganography Security of Financial Data SN Computer Science 2022
HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud Journal of Ambient Intelligence and Humanized Computing
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Science (General): Cybernetics: Information theory
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
22 2021
Lightweight Feistel structure based hybrid-crypto model for multimedia data security over uncertain cloud environment Wireless Networks
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Technology: Technology (General): Industrial engineering. Management engineering: Information technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Telecommunication
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
6 2020
The Progressive Multilevel Embedding Method for Audio Steganography

Journal of Physics: Conference Series 5 2020
Citations Analysis
The category Science: Science (General): Cybernetics: Information theory 5 is the most commonly referenced area in studies that cite this article. The first research to cite this article was titled Secure Localisation of Wireless Devices with Application to Sensor Networks using Steganography and was published in 2016. The most recent citation comes from a 2023 study titled Lightweight Encryption Assisted Man-in-The-Middle Attack-Resilient Steganography Model for Secure Satellite Imagery Services: LEMARS. This article reached its peak citation in 2017, with 14 citations. It has been cited in 11 different journals, 9% of which are open access. Among related journals, the Journal of Software Engineering and Applications cited this research the most, with 13 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year