An aes double–layer based message security scheme
Nowadays, the Achilles heel of any software system that deals with data communication
and/or storage on a cloud is the security of information being handled. However, modern …
and/or storage on a cloud is the security of information being handled. However, modern …
High-capacity adaptive steganography based on LSB and Hamming code
Y Wang, M Tang, Z Wang - Optik, 2020 - Elsevier
The development of the Internet provides the ability to transfer large amounts of data quickly
and easily. However, sensitive data is easily intercepted by hackers on the Internet. Image …
and easily. However, sensitive data is easily intercepted by hackers on the Internet. Image …
Sequence-based bit-cycling in double layer message security
This paper proposes two different implementations of a double-layer message security
scheme. In both schemes, the first layer is of a cryptographic nature, employing the AES …
scheme. In both schemes, the first layer is of a cryptographic nature, employing the AES …
Analysis and implementation of IWT-SVD scheme for video steganography
In the world of computer, the skill of sending and displaying secret data particularly in public
places faced several challenges and had received more attention now. Protecting …
places faced several challenges and had received more attention now. Protecting …
Multilayer technique to secure data transfer in private cloud for saas applications
SS Ghuge, N Kumar, S Savitha… - 2020 2nd International …, 2020 - ieeexplore.ieee.org
In recent times Cloud Computing [CC] has emanated as a substitute paradigm for hosting
and providing services over the Internet. Software as a Service (Saas) is one among such …
and providing services over the Internet. Software as a Service (Saas) is one among such …
An improved privacy protection algorithm for multimodal data fusion
ZF Chen, JJ Shuai, FJ Tian, WY Li… - Scientific …, 2022 - Wiley Online Library
With the rapid development of Internet technology, the use and sharing of data have brought
great opportunities and challenges to mankind. On the one hand, the development of data …
great opportunities and challenges to mankind. On the one hand, the development of data …
A proposed optimized steganography technique using ROI, IWT and SVD
Current advancement in communication technology have made rapid delivery and sharing
of multimedia information promising, but these advancements in technology are leading …
of multimedia information promising, but these advancements in technology are leading …
[PDF][PDF] An approach to hide an audio file in image using LSB technique
MM Msallam - Al-Furat Journal of Innovations in Electronics and …, 2023 - fjiece.atu.edu.iq
Al-Furat Journal of Innovation in Electronics and Computer Engineeing (FJIECE) Page 1 AT U
-FJIE C E , Vo lu m e 2 – Issu e 2 – N o v . 22 , 2 0 2 3 , © 2 0 2 0 FJIE C E , All R ig h ts R eserv …
-FJIE C E , Vo lu m e 2 – Issu e 2 – N o v . 22 , 2 0 2 3 , © 2 0 2 0 FJIE C E , All R ig h ts R eserv …
A Novel Method for Sample Selection in Audio Stenographic Systems
BJ Bhatkalkar, RV Arjunan, A Alok… - 2022 6th …, 2022 - ieeexplore.ieee.org
This research work proposes a new method for performing sample selection in audio
steganographic systems, which can also be applied to strictly frequency-based and spatial …
steganographic systems, which can also be applied to strictly frequency-based and spatial …
[PDF][PDF] Digital Rights Management for Images via LSB Embedding and Triangular Sequence
A Baher - 2023 - researchgate.net
Steganography is a widely used method for hiding information, allowing for covert
communication. Image steganography is particularly advantageous as it allows information …
communication. Image steganography is particularly advantageous as it allows information …