Video Steganography Techniques: A Comprehensive Review and Performance Evaluation
This paper discusses various steganography techniques and their parameters. Based on
these parameters, we make some comparative analysis among different steganography …
these parameters, we make some comparative analysis among different steganography …
A Secure RSA-Based Image Encryption Method
V Shukla, SN Tiwari, MA Al-Shareeda… - … Conference on Cryptology …, 2023 - Springer
Modern world moves around data communication, and its security is a key issue nowadays.
It is very unsafe to transmit images over insecure wireless communication channels. In this …
It is very unsafe to transmit images over insecure wireless communication channels. In this …
Study of Energy-Efficient Virtual Machine Migration with Assurance of Service-Level Agreements
SS Panwar, MMS Rauthan, V Barthwal, S Gaur… - … on Cryptology & …, 2023 - Springer
With the rising usage of cloud services, data centers (DC) are improving the services to their
customers. The substantial energy consumption (EC) of cloud DCs poses significant …
customers. The substantial energy consumption (EC) of cloud DCs poses significant …
A Note on 5G Networks: Security Issues, Challenges and Connectivity Approaches
V Shukla, M Kushwaha, R Sharma… - … Conference on Cryptology …, 2023 - Springer
The “5G” mobile network is expected to achieve the demanding needs of mobile traffic in the
twenty-first century and predicted to be the essential architecture for the advance assistance …
twenty-first century and predicted to be the essential architecture for the advance assistance …
Intrusion Detection in IoT Devices Using ML and DL Models with Fisher Score Feature Selection
IoT devices are physical things that have sensors, network connectivity, and software built
into them. This allows them to gather data and share it with other systems and devices. The …
into them. This allows them to gather data and share it with other systems and devices. The …
Investigation of Sinkhole Attacks and Network Simulation on 6LoWPAN
Sinkhole attacks have been the most dangerous threat to security in recent times. The
attackers send malicious requests to Domain Name Server (DNS) that causes unavailability …
attackers send malicious requests to Domain Name Server (DNS) that causes unavailability …
Secure Design and Implementation of Smart Traffic Light Management System
By identifying areas of heavy congestion, smart traffic management systems can then
implement measures to alleviate that problem. In order to accomplish this, it analyzes and …
implement measures to alleviate that problem. In order to accomplish this, it analyzes and …
A New Data Communication Method Using RSA and Steganography Check for updates
Information exchange is an inseparable part in modern life. The security of information is a
key term. Cryptography is all about keeping data secure. Cryptography provides various …
key term. Cryptography is all about keeping data secure. Cryptography provides various …
Enhancing Privacy in VANET Through Attribute-Based Encryption and Blockchain Integration: Uncovering the Benefits and Challenges
V Verma, Chinmay - International Conference on Cryptology & Network …, 2023 - Springer
With the popularity of blockchain innovation, data security has become a concern. The
blockchain framework is transparent and immutable, but its unique strategy creates …
blockchain framework is transparent and immutable, but its unique strategy creates …
Supervised Learning Approaches for Deceit Identification: Exploring EEG as a Non-invasive Technique
Deceit identification has been a problem since ages and for generations past now. The
process is taken in both positive and negative prespectives. Positive for the justice it delivers …
process is taken in both positive and negative prespectives. Positive for the justice it delivers …