A robust audio steganography technique based on image encryption using different chaotic maps

MA Nasr, W El-Shafai, ESM El-Rabaie… - Scientific Reports, 2024 - nature.com
The development of innovative methods for concealing critical data in multimedia files has
exploded in information security in recent years. Cryptography and steganography cannot …

Parallel Implementation of Key Algorithms for Intelligent Processing of Graphic Signal Data of Consumer Digital Equipment

C Huang, R Li, A Li - Mobile Networks and Applications, 2023 - Springer
With the rapid development of Internet of Things (IoT) and information technology, there are
more and more data storage about graphic signals in digital devices. Therefore, enterprises …

Lsb based audio steganography using rsa and chacha20 encryption

P Ganwani, L Gupta, C Jain, R Kulkarni… - 2021 12th …, 2021 - ieeexplore.ieee.org
With the evolution of the digital era and internet technology, most of our confidential
information such as financial and personal data or even secret information about our assets …

Multifactor IoT Authentication System for Smart Homes Using Visual Cryptography, Digital Memory, and Blockchain Technologies

A Thompson, A Abayomi, AJ Gabriel - Blockchain Applications in the …, 2022 - Springer
In this era of smartness, the existing access control of things and objects in homes utilizes
personal identification number (PIN)-or password-based authentication scheme, which …

音频隐写方法综述: 从传统到深度学习.

张雄伟, 葛晓义, 孙蒙, 李莉 - … & Processing/Shu Ju Cai Ji …, 2023 - search.ebscohost.com
数字音频作为网络空间中广泛应用的媒体, 是承载秘密信息的良好载体, 常被用来构建实时性强,
复杂度低, 不可感知性好的隐蔽通信. 音频隐写作为确保网络信息安全和数据保密通信的关键 …

A review on geo-location-based authentication with various lossless compression techniques

V Kumar, G Singh, I Singh - Computational Intelligence: Select …, 2023 - Springer
Data transactions on the Internet are rising every day, posing a significant security concern.
Consequently, the development of techniques such as steganography and cryptography …

A comparative study of various lossless compression techniques of steganography and cryptography

V Kumar, G Singh, B Singh - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Data transaction is increasing day by day over internet which is resulting into a great
challenge of their security. Data security had been a great matter of concern for which …

Hybrid approach for Data Security using Coverless Image Steganography with AES

L Negi, L Negi - 2021 6th International Conference on …, 2021 - ieeexplore.ieee.org
We need systems which makes data more secure as threats to data are increasing day by
day. Cryptography and Steganography are the techniques which resist security threats from …

IDENTIFYING OPTIMAL MESSAGE EMBEDDING LOCATION IN AUDIO STEGANOGRAPHY USING GENERATIVE ADVERSARIAL NETWORKS.

M Hajer, M Anbar - Eastern-European Journal of Enterprise …, 2022 - search.ebscohost.com
Audio steganography (AS) uses the auditory redundancy of the human ear to conceal the
hidden message inside the audio track. In recent studies, deep learning-based steganalysis …

Hybrid Optimization Using CC and PSO in Cryptography Encryption for Medical Images

S Adhikari, M Brayyich, D Akila, B Sakar… - International Conference …, 2023 - Springer
Private patient data is extensively present in medical photographs. Patients and medical
institutions would suffer catastrophic losses as a result of medical image theft and …