A new 3-bit hiding covert channel algorithm for public data and medical data security using format-based text steganography
R Gurunath, D Samanta - Journal of Database Management (JDM), 2023 - igi-global.com
The primary concern of every individual and organization is the security of sensitive
information generated via authorized activities; nonetheless, illicit data drawing and …
information generated via authorized activities; nonetheless, illicit data drawing and …
The adaptive multi-level phase coding method in audio steganography
Audio steganography allows and inspires many researchers to design methods for secure
communication. Based on the evaluation on the existing methods, it was found that most …
communication. Based on the evaluation on the existing methods, it was found that most …
Securing IoT data using steganography: A practical implementation approach
F Djebbar - Electronics, 2021 - mdpi.com
Adding network connectivity to any “thing” can certainly provide great value, but it also
brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” …
brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” …
Review on lightweight cryptography techniques and steganography techniques for IoT environment
S Supriya K, J Lovesum SP - International Journal of System Assurance …, 2024 - Springer
In the modern world, technology has connected to our day-to-day life in different forms. The
Internet of Things (IoT) has become an innovative criterion for mass implementations and a …
Internet of Things (IoT) has become an innovative criterion for mass implementations and a …
Fractional-order spatial steganography and blind steganalysis for printed matter: Anti-counterfeiting for product external packing in Internet-of-Things
YF Pu, N Zhang, H Wang - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
This paper advocates a novel conceptual formulation of the fractional-order spatial
steganography (FSS) and blind steganalysis for printed matter, which can be efficiently …
steganography (FSS) and blind steganalysis for printed matter, which can be efficiently …
Multilevel Redundant Discrete Wavelet Transform (ML-RDWT) and optimal Red Deer algorithm (ORDA) centred approach to mitigate the effect of ICI, BER and CIR in …
K Nagarajan, S Sophia - Wireless Personal Communications, 2022 - Springer
Nowadays, there is a great demand for ultra-high data rate (UHDR) transmission on most
5th generation wireless networks. In this concern, the multiple-input multiple-output …
5th generation wireless networks. In this concern, the multiple-input multiple-output …
IoT Security Using Steganography
Internet of things (IoT) is one of those emerging technologies, which are going to rule the
world in the next few decades. Due to the advancement of low-cost computing systems and …
world in the next few decades. Due to the advancement of low-cost computing systems and …
Securing data using audio steganography for the internet of things
Abstract The Internet of Things (IoT) is prevalent in today's world and is part of our everyday
life. While the residential district gains in several respects, numerous problems are …
life. While the residential district gains in several respects, numerous problems are …
[PDF][PDF] Lightweight Steganography Technique in The Internet of Things: A survey
HA Qasim, RS Mohammed - Al-Salam Journal for Engineering and …, 2024 - iasj.net
In the context of the Internet of Things (IoT), lightweight steganography provides a
revolutionary combination of technology and security, where data concealment meets the …
revolutionary combination of technology and security, where data concealment meets the …
Algorithm of information embedding into digital images based on the Chinese remainder theorem for data security
O Evsutin, K Dzhanashia - Cryptography, 2020 - mdpi.com
With the huge transfers of data involved in the modern world, it is both crucial and
challenging to maintain the security of data. This paper proposes a novel algorithm of …
challenging to maintain the security of data. This paper proposes a novel algorithm of …