Review on secured data capabilities of cryptography, steganography, and watermarking domain

Farah Qasim Ahmed Al-Yousuf, Roshidi Din

Abstract


Due to the increment of using Internet to transfer the critical and secret data, many studies interested in secured data and investigated many ways to secure the transferred information. This paper presents a review study on the field that used in a secured data domain. The main objective of this study is explore the capabilities of secured data that used widely by researchers. Furthermore, the benefits and the drawbacks for each of secured data domain are also studied. This paper concludes that cryptography techniques could be utilized with steganography and watermarking in secured data domain to enhance the security mechanisms.

Keywords


Secured data, Technique used, Algorithm used

Full Text:

PDF


DOI: http://doi.org/10.11591/ijeecs.v17.i2.pp1053-1058

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

The Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).

shopify stats IJEECS visitor statistics