A novel trust-based security and privacy model for internet of vehicles using encryption and steganography

MS Rathore, M Poongodi, P Saurabh… - Computers and …, 2022 - Elsevier
High-speed wireless network technologies play a vital role in autonomous vehicle
communication systems (AVS), ie, IoV (Internet of Vehicles), and enhance the effectiveness …

Secure file storage in cloud computing using hybrid cryptography algorithm

PV Maitri, A Verma - 2016 international conference on wireless …, 2016 - ieeexplore.ieee.org
Now a day's cloud computing is used in many areas like industry, military colleges etc to
storing huge amount of data. We can retrieve data from cloud on request of user. To store …

[PDF][PDF] A LSB based image steganography using random pixel and bit selection for high payload

UA Ehsan Ali, E Ali, M Sohrawordi, MN Sultan - 2021 - dro.deakin.edu.au
Security in digital communication is becoming more important as the number of systems is
connected to the internet day by day. It is necessary to protect secret message during …

[PDF][PDF] A hybrid text steganography approach utilizing Unicode space characters and zero-width character

M Aman, A Khan, B Ahmad, S Kouser - International Journal on …, 2017 - academia.edu
This paper presents a steganographic approach utilizing Unicode space and Zero-Width
Characters. The existing techniques are less robust, not sensitive against steg-analysis and …

Secure File Storage In Cloud Computing Using Hybrid Cryptography Algorithm.

B Bala, L Kamboj, P Luthra - International Journal of …, 2018 - search.ebscohost.com
Now a day's cloud computing is used in many areas like industry, military colleges etc to
storing huge amount of data. We can retrieve data from cloud on request of user. To store …

[PDF][PDF] Secure file storage on cloud using hybrid cryptography

A Poduval, A Doke, H Nemade… - International Journal of …, 2019 - academia.edu
In this era cloud computing is used in various fields like industry, military, college, etc. for
various services and storage of huge amount of data. Data stored in this cloud can be …

Analysis review on feature-based and word-rule based techniques in text steganography

FQA Alyousuf, R Din - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
This paper presents several techniques used in text steganography in term of feature-based
and word-rule based. Additionally, it analyses the performance and the metric evaluation of …

Information hiding through dynamic text steganography and cryptography: Computing and informatics

D Bhat, V Krithi, KN Manjunath… - … on advances in …, 2017 - ieeexplore.ieee.org
Over the last decade, there has been a constant increase in the accessibility and utility of the
Internet. More number of people are tending towards the use of mobile applications, E-mails …

Data security using cryptography and steganography technique on the cloud

KD Abel, S Misra, A Agrawal, R Maskeliunas… - … Intelligence in Machine …, 2022 - Springer
Cloud computing technology is on the rise in our world today. It has become a sought-after
technology due to its flexibility for users to access their data at any time of the day. From …

Capacity investigation of Markov chain-based statistical text steganography: Arabic language case

N Alghamdi, L Berriche - Proceedings of the 2019 Asia Pacific …, 2019 - dl.acm.org
Nowadays, there is a high motivation to develop techniques of sending secret information as
a result of the need to transfer some data in a secret way. Steganography is one of the …