Post-quantum security: Opportunities and challenges

S Li, Y Chen, L Chen, J Liao, C Kuang, K Li, W Liang… - Sensors, 2023 - mdpi.com
Cryptography is very essential in our daily life, not only for confidentiality of information, but
also for information integrity verification, non-repudiation, authentication, and other aspects …

Stegocrypt: A robust tri‐stage spatial steganography algorithm using TLM encryption and DNA coding for securing digital images

W Alexan, E Mamdouh, A Aboshousha… - IET Image …, 2024 - Wiley Online Library
This research work presents a novel secured spatial steganography algorithm consisting of
three stages. In the first stage, a secret message is divided into three parts, each is …

[PDF][PDF] A Review of Image Steganography Based on Multiple Hashing Algorithm.

A Alenizi, MS Mohammadi, AA Al-Hajji… - … , Materials & Continua, 2024 - researchgate.net
Steganography is a technique for hiding secret messages while sending and receiving
communications through a cover item. From ancient times to the present, the security of …

Hiding Data within Thumbnail Videos: An Adaptive Downsampling-Resilient Video Steganography Method

Y Wang - IEEE Access, 2024 - ieeexplore.ieee.org
The rapid evolution of social media platforms presents novel opportunities and challenges
for video steganography techniques. This paper focuses on taking thumbnail videos as the …

Time-Based Steganography Image with Dynamic Encryption Key Generation

K Wijaya, B Lansky, CA Dewi, GZ Nabiilah - Procedia Computer Science, 2023 - Elsevier
The rapid advancement of technology has necessitated stronger protection measures for
data exchange. Encryption, coupled with robust keys, is an effective method to safeguard …

Survey on Video Security: Examining Threats, Challenges, and Future Trends.

A Asghar, A Shifa, MN Asghar - Computers, Materials & …, 2024 - search.ebscohost.com
Videos represent the most prevailing form of digital media for communication, information
dissemination, and monitoring. However, their widespread use has increased the risks of …

[PDF][PDF] Message steganography using separate locations and blocks

RJ Rasras, MRA Sara, Z Alqadi - International Journal of Electrical …, 2024 - researchgate.net
A novel method of message steganography is introduced to solve the disadvantages of
traditional least significant bit (LSB) based methods by dividing the covering-stego image …

Enhanced Security Through Integrated Morse Code Encryption and LSB Steganography in Digital Communications

H Olewi, M Msallam, S Salim… - Traitement du …, 2024 - avesis.ankara.edu.tr
In the digital era, the protection of sensitive data transmitted over the Internet, such as credit
card information, is paramount. This study introduces an innovative system that enhances …

Steganografi Gambar Menggunakan Metode Least Significant Bit Pada Citra Dengan Operasi XOR

M Adha - … of Informatics, Technology and Science (BITS), 2024 - repository.uin-suska.ac.id
Salah satu cara mengamankan pesan rahasia dari pihak-pihak lain yang tidak
berkepentingan adalah steganografi. Salah satu metode yang paling banyak digunakan …

IMPLEMENTATION OF ELGAMAL AND LEAST SIGNIFICANT BIT (LSB) ALGORITHM FOR ENDING AND HIDDEN MESSAGES IN DIGITAL IMAGES

T Limbong, AMH Pardede, D Purba… - Journal of Theoretical …, 2023 - eprints.ust.ac.id
Basically, confidential data needs to be stored or conveyed in a certain way so that it is not
known by unauthorized foreign parties. And to overcome this problem, the science of …