An aes double–layer based message security scheme

W Alexan, A Hamza, H Medhat - … International Conference on …, 2019 - ieeexplore.ieee.org
Nowadays, the Achilles heel of any software system that deals with data communication
and/or storage on a cloud is the security of information being handled. However, modern …

High-capacity adaptive steganography based on LSB and Hamming code

Y Wang, M Tang, Z Wang - Optik, 2020 - Elsevier
The development of the Internet provides the ability to transfer large amounts of data quickly
and easily. However, sensitive data is easily intercepted by hackers on the Internet. Image …

Sequence-based bit-cycling in double layer message security

W Alexan, H Medhat, A Hamza… - 2018 Advances in …, 2018 - ieeexplore.ieee.org
This paper proposes two different implementations of a double-layer message security
scheme. In both schemes, the first layer is of a cryptographic nature, employing the AES …

Analysis and implementation of IWT-SVD scheme for video steganography

U Pilania, P Gupta - … Engineering: Proceedings of 3rd ICMETE 2019, 2020 - Springer
In the world of computer, the skill of sending and displaying secret data particularly in public
places faced several challenges and had received more attention now. Protecting …

Multilayer technique to secure data transfer in private cloud for saas applications

SS Ghuge, N Kumar, S Savitha… - 2020 2nd International …, 2020 - ieeexplore.ieee.org
In recent times Cloud Computing [CC] has emanated as a substitute paradigm for hosting
and providing services over the Internet. Software as a Service (Saas) is one among such …

An improved privacy protection algorithm for multimodal data fusion

ZF Chen, JJ Shuai, FJ Tian, WY Li… - Scientific …, 2022 - Wiley Online Library
With the rapid development of Internet technology, the use and sharing of data have brought
great opportunities and challenges to mankind. On the one hand, the development of data …

A proposed optimized steganography technique using ROI, IWT and SVD

U Pilania, P Gupta - International Journal of Information Systems & …, 2019 - papers.ssrn.com
Current advancement in communication technology have made rapid delivery and sharing
of multimedia information promising, but these advancements in technology are leading …

[PDF][PDF] An approach to hide an audio file in image using LSB technique

MM Msallam - Al-Furat Journal of Innovations in Electronics and …, 2023 - fjiece.atu.edu.iq
Al-Furat Journal of Innovation in Electronics and Computer Engineeing (FJIECE) Page 1 AT U
-FJIE C E , Vo lu m e 2 – Issu e 2 – N o v . 22 , 2 0 2 3 , © 2 0 2 0 FJIE C E , All R ig h ts R eserv …

A Novel Method for Sample Selection in Audio Stenographic Systems

BJ Bhatkalkar, RV Arjunan, A Alok… - 2022 6th …, 2022 - ieeexplore.ieee.org
This research work proposes a new method for performing sample selection in audio
steganographic systems, which can also be applied to strictly frequency-based and spatial …

[PDF][PDF] Digital Rights Management for Images via LSB Embedding and Triangular Sequence

A Baher - 2023 - researchgate.net
Steganography is a widely used method for hiding information, allowing for covert
communication. Image steganography is particularly advantageous as it allows information …