Implementation of image security using elliptic curve cryptography RSA algorithm and least significant bit algorithm
J Hanayong, M Zarlis, P Sihombing - Journal of Physics …, 2021 - iopscience.iop.org
Data exchange is a very important thing in today's technological development. Two
important factors must be considered in the process of data exchange, namely speed and …
important factors must be considered in the process of data exchange, namely speed and …
[PDF][PDF] RSA Over-Encryption Employing RGB Channels through a Steganography Variant
I Martíneza, W Fuertesa, M Palaciosa… - … Journal on Advanced …, 2021 - academia.edu
This study aims to provide a solution for RSA over-encryption based on steganography
variant to hide sensitive information that requires security. The current study describes a …
variant to hide sensitive information that requires security. The current study describes a …
Image Steganography Based on DNA Encoding and Bayer Pattern
QM Ismail - New Trends in Information and Communications …, 2022 - books.google.com
Steganography is a method of concealing sensitive data while transmitting it over public
networks and it is regarded as one of the invisible security techniques. This paper proposed …
networks and it is regarded as one of the invisible security techniques. This paper proposed …
Implementation of Steganography Modified Least Significant Bit using the Columnar Transposition Cipher and Caesar Cipher Algorithm in Image Insertion
JT Tarigan, DI Putra - Journal of Physics: Conference Series, 2021 - iopscience.iop.org
Steganography technique is a technique to hide data or information into other media such
as digital images, text, sound, or video. One of the simplest methods of Steganography in the …
as digital images, text, sound, or video. One of the simplest methods of Steganography in the …
Image Steganography Based on DNA Encoding and Bayer Pattern
EA Abbood, RM Neamah, QM Ismail - New Trends in Information and …, 2021 - Springer
Steganography is a method of concealing sensitive data while transmitting it over public
networks and it is regarded as one of the invisible security techniques. This paper proposed …
networks and it is regarded as one of the invisible security techniques. This paper proposed …