Secure file storage on cloud using hybrid cryptography
V Sharma, A Chauhan, H Saxena… - 2021 5th …, 2021 - ieeexplore.ieee.org
In recent years, Cloud Computing has played a vital role in the field of computing. It has
revolutionized how computing is used in the industry from first setting up the infrastructure …
revolutionized how computing is used in the industry from first setting up the infrastructure …
Efficient Hybrid Blind Watermarking in DWT‐DCT‐SVD with Dual Biometric Features for Images
In the modern era of virtual computers over the notional environment of computer networks,
the protection of influential documents is a major concern. To bring out this motto, digital …
the protection of influential documents is a major concern. To bring out this motto, digital …
Secure data transfer over internet using image steganography
DM Abdullah, SY Ameen, N Omar… - Asian Journal of …, 2021 - journal.repositoryarticle.com
Whether it's for work or personal well-being, keeping secrets or private information has
become part of our everyday existence. Therefore, several researchers acquire an entire …
become part of our everyday existence. Therefore, several researchers acquire an entire …
[PDF][PDF] Dwt-svd based image steganography using threshold value encryption method.
Digital image steganography technique based on hiding the secret data behind of cover
image in such a way that it is not detected by the human visual system. This paper presents …
image in such a way that it is not detected by the human visual system. This paper presents …
[PDF][PDF] Medical image forgery detection by a novel segmentation method With KPCA
V Kalpana, M Jayalakshmi, VV Kishore - Cardiometry, 2022 - researchgate.net
One of the most challenging tasks of recent days is detecting digital image forgery. Effective
image processing tools are developed with excellent technology enhancement, making an …
image processing tools are developed with excellent technology enhancement, making an …
A digital watermarking encryption technique based on FPGA cloud accelerator
Y Cao, F Yu, Y Tang - IEEE Access, 2020 - ieeexplore.ieee.org
Digital watermarking has the properties such as invisibility and anti-aggression, so the
digital watermarking technology has been widely used in copyright protection, information …
digital watermarking technology has been widely used in copyright protection, information …
GUI Implementation of Modified and Secure Image Steganography Using Least Significant Bit Substitution.
Due to swift improvement of information innovation in recent times, providing security to data
has become major concern and threat to Information Privacy has become inevitable. Data …
has become major concern and threat to Information Privacy has become inevitable. Data …
Steganography in TCP/IP Networks
O Tymchenko, B Havrysh - International Conference of Artificial …, 2022 - Springer
Due to the large amount of data that is transmitted over computer networks, web traffic is an
attractive environment for steganographic techniques. The question is, can data that is sent …
attractive environment for steganographic techniques. The question is, can data that is sent …
An Enhanced Implementation of Security Management System (SSMS) using UEBA in Smart Grid based SCADA Systems
AW Mir, KRR Kumar - Applications of machine intelligence in …, 2022 - taylorfrancis.com
Security pertaining to critical infrastructures based industrial control systems is of utmost
importance to any nation owing to its operational dependency for sectors like nuclear …
importance to any nation owing to its operational dependency for sectors like nuclear …
[PDF][PDF] Implementation of image authentication using digital watermarking with biometric
D Harika, S Noorullah - … and Management Sciences*. https://doi. org …, 2023 - academia.edu
The rapid global development of E-commerce in terms of digitalization and distribution of
digital contents in the form of image, audio, video, increases the possibility of unrestricted …
digital contents in the form of image, audio, video, increases the possibility of unrestricted …