A novel steganography technique for digital images using the least significant bit substitution method
Communication has become a lot easier in this era of technology, development of high-
speed computer networks, and the inexpensive uses of Internet. Therefore, data …
speed computer networks, and the inexpensive uses of Internet. Therefore, data …
[PDF][PDF] Modified Inverse LSB Method for Highly Secure Message Hiding
The data may be very important and very confidential and when sent in an insecure
environment may be stolen or being snatched on them, which eliminates the importance and …
environment may be stolen or being snatched on them, which eliminates the importance and …
Security through blowfish and lsb bit–cycling with mathematical sequences
W Alexan, F Hemeida - 2019 Signal Processing: Algorithms …, 2019 - ieeexplore.ieee.org
Recently, lots of research work and papers are focusing on the combination of
steganography and cryptography. Steganography conceals the presence of a secret …
steganography and cryptography. Steganography conceals the presence of a secret …
[PDF][PDF] A novel technique for data steganography
In this paper, a novel stego-method will be introduced, which can be used to hide any secret
message in any holding color image. The proposed method will be implemented and tested …
message in any holding color image. The proposed method will be implemented and tested …
Data encryption & decryption using steganography
N Manohar, PV Kumar - 2020 4th international conference on …, 2020 - ieeexplore.ieee.org
Video steganography is a method that processes secure communication. When we see the
history of steganography, it was hidden in many ways such as tablets covered with wax, & …
history of steganography, it was hidden in many ways such as tablets covered with wax, & …
Secured image steganography based on Catalan transform
S Mukhopadhyay, S Hossain, SK Ghosal… - Multimedia Tools and …, 2021 - Springer
Transform domain steganography methods are always preferable than spatial domain
methods to the research community due to following advantages: better feature …
methods to the research community due to following advantages: better feature …
[PDF][PDF] Secure key exchange against man-in-the-middle attack: Modified diffie-hellman protocol
One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a
widely used technique on which key exchange systems around the world depend. This …
widely used technique on which key exchange systems around the world depend. This …
[PDF][PDF] Comparative Analysis of Color Image Encryption-Decryption Methods Based on Matrix Manipulation
Color image encryption-decryption is an important issue, because it is used in many
important applications. This paper will introduce 3 methods of image encryption-decryption …
important applications. This paper will introduce 3 methods of image encryption-decryption …
[PDF][PDF] A LSB based image steganography using random pixel and bit selection for high payload
Security in digital communication is becoming more important as the number of systems is
connected to the internet day by day. It is necessary to protect secret message during …
connected to the internet day by day. It is necessary to protect secret message during …
Diffie-Hellman key exchange through Steganographied images
A Khaldi - Law, State and Telecommunications Review, 2018 - periodicos.unb.br
Purpose”“In a private key system, the major problem is the exchange of the key between the
two parties. Diffie and Hellman have set up a way to share the key. However, this technique …
two parties. Diffie and Hellman have set up a way to share the key. However, this technique …