1. How to submit my research paper? What’s the process of publication of my paper?
The journal receives submitted manuscripts via email only. Please submit your research paper in .doc or .pdf format to the submission email: lnit@ejournal.net.
2. Can I submit an abstract?
The journal publishes full research papers....[Read More]

2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers

Nouf A. Al-Otaibi1 and Adnan A. Gutub2
1.College of Computer & Information Systems, Umm Al-Qura University, Makkah, Saudi Arabia
2.Custodian of the Two Holy Mosques Institute of the Hajj & Omrah Research, Umm Al-Qura University, Saudi Arabia
Abstract—High security system suitable to hide sensitive text-data on personal computer is proposed and implemented. The system hiding techniques involves AES cryptography followed by image based steganography as two layers to insure high security. The study involved several tests to increase the capacity within the steganography layer adopting 1 and 2 least significant bits stego methods. The study also explores the data dependency and its security effects by experimenting it on 30 different fixed size images showing interesting attractive results.

Index Terms—security for personal computer, AES cryptography, image base steganography, hiding text on PC.

Cite: Nouf A. Al-Otaibi and Adnan A. Gutub, "2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers," Lecture Notes on Information Theory, Vol. 2, No. 2, pp. 151-157, June 2014. doi: 10.12720/lnit.2.2.151-157
Copyright © 2012-2015 Lecture Notes on Information Theory, All Rights Reserved