Encryption and Steganography a secret data using circle shapes in colored images
ZN Al-Kateeb, MJ Al-Shamdeen… - Journal of Physics …, 2020 - iopscience.iop.org
Since the earliest times, people have used the encryption and hiding data to achieve a safe
and reliable transfer of important data. This paper propesed a new method for encrypting …
and reliable transfer of important data. This paper propesed a new method for encrypting …
Digital circuit implementation and PRNG-based data security application of variable-order fractional Hopfield neural network under electromagnetic radiation using …
S Kaçar - The European Physical Journal Special Topics, 2022 - Springer
In this study, for the first time in the literature, a Variable-Order Fractional Hopfield Neural
Network Under Electromagnetic Radiation (VOFHNNUER) has been presented. Also, for the …
Network Under Electromagnetic Radiation (VOFHNNUER) has been presented. Also, for the …
[PDF][PDF] Detecting hidden information in FAT
K Shekhanin, A Kuznetsov, V Krasnobayev… - International Journal of …, 2020 - academia.edu
Various steganographic methods are used to hide information. Some of them allow you to
reliably hide the fact of storage and transmission of information data. This paper analysis the …
reliably hide the fact of storage and transmission of information data. This paper analysis the …
Shared memory implementation and performance analysis of LSB steganography based on chaotic tent map
Concealing secret information in an image so that any perceptible evidence of the image
alteration is insignificant, is known as image steganography. Image steganography can be …
alteration is insignificant, is known as image steganography. Image steganography can be …
An efficient color image encryption scheme based on a matrix scrambling method and a new hybrid chaotic map
H Ogras - Cogent Engineering, 2021 - Taylor & Francis
In this paper, an efficient chaos-based image encryption scheme for color images is
proposed. This paper includes a strong displacement structure through a specified matrix …
proposed. This paper includes a strong displacement structure through a specified matrix …
[PDF][PDF] Chaos-based Color Image Steganography Method Using 3 D Cat Map
Steganography is a technique to hide a secret message within a different multimedia carrier
so that the secret message cannot be identified. The goals of steganography techniques …
so that the secret message cannot be identified. The goals of steganography techniques …
K-en az anlamlı bitlere dayalı kaotik bir harita kullanan renkli görüntü steganografisi
H Çelik, N Doğan - Politeknik Dergisi, 2021 - dergipark.org.tr
Günümüzde dijital iletişim içerisinde bilginin güvenliği çok önemli bir yer tutmaktadır. Uçtan
uca iletişimlerde önemli bilgilerin şifrelenmesi veya bir taşıyıcı üzerine gömülerek …
uca iletişimlerde önemli bilgilerin şifrelenmesi veya bir taşıyıcı üzerine gömülerek …
[PDF][PDF] Development of an Improved Steganography-based Patient Management Information System
MA Idakwo - ATBU Journal of Science, Technology and Education, 2022 - academia.edu
This paper developed an improved patient management information system with covert
communication. The developed system covertly communicates (steganography) patient's …
communication. The developed system covertly communicates (steganography) patient's …
Image Steganography Based on DNA Encoding and Bayer Pattern
QM Ismail - New Trends in Information and Communications …, 2022 - books.google.com
Steganography is a method of concealing sensitive data while transmitting it over public
networks and it is regarded as one of the invisible security techniques. This paper proposed …
networks and it is regarded as one of the invisible security techniques. This paper proposed …
Shared Memory Based Parallel Enactment of a Hybrid Authentication Technique
The paper deals with a hybrid authentication through shared memory based parallel
algorithm. Recursive prime non-prime substitution algorithm (RPSP) encrypts the secret data …
algorithm. Recursive prime non-prime substitution algorithm (RPSP) encrypts the secret data …