Post-quantum security: Opportunities and challenges
Cryptography is very essential in our daily life, not only for confidentiality of information, but
also for information integrity verification, non-repudiation, authentication, and other aspects …
also for information integrity verification, non-repudiation, authentication, and other aspects …
Stegocrypt: A robust tri‐stage spatial steganography algorithm using TLM encryption and DNA coding for securing digital images
This research work presents a novel secured spatial steganography algorithm consisting of
three stages. In the first stage, a secret message is divided into three parts, each is …
three stages. In the first stage, a secret message is divided into three parts, each is …
[PDF][PDF] A Review of Image Steganography Based on Multiple Hashing Algorithm.
Steganography is a technique for hiding secret messages while sending and receiving
communications through a cover item. From ancient times to the present, the security of …
communications through a cover item. From ancient times to the present, the security of …
Hiding Data within Thumbnail Videos: An Adaptive Downsampling-Resilient Video Steganography Method
Y Wang - IEEE Access, 2024 - ieeexplore.ieee.org
The rapid evolution of social media platforms presents novel opportunities and challenges
for video steganography techniques. This paper focuses on taking thumbnail videos as the …
for video steganography techniques. This paper focuses on taking thumbnail videos as the …
Time-Based Steganography Image with Dynamic Encryption Key Generation
K Wijaya, B Lansky, CA Dewi, GZ Nabiilah - Procedia Computer Science, 2023 - Elsevier
The rapid advancement of technology has necessitated stronger protection measures for
data exchange. Encryption, coupled with robust keys, is an effective method to safeguard …
data exchange. Encryption, coupled with robust keys, is an effective method to safeguard …
Survey on Video Security: Examining Threats, Challenges, and Future Trends.
Videos represent the most prevailing form of digital media for communication, information
dissemination, and monitoring. However, their widespread use has increased the risks of …
dissemination, and monitoring. However, their widespread use has increased the risks of …
[PDF][PDF] Message steganography using separate locations and blocks
A novel method of message steganography is introduced to solve the disadvantages of
traditional least significant bit (LSB) based methods by dividing the covering-stego image …
traditional least significant bit (LSB) based methods by dividing the covering-stego image …
Enhanced Security Through Integrated Morse Code Encryption and LSB Steganography in Digital Communications
In the digital era, the protection of sensitive data transmitted over the Internet, such as credit
card information, is paramount. This study introduces an innovative system that enhances …
card information, is paramount. This study introduces an innovative system that enhances …
Steganografi Gambar Menggunakan Metode Least Significant Bit Pada Citra Dengan Operasi XOR
M Adha - … of Informatics, Technology and Science (BITS), 2024 - repository.uin-suska.ac.id
Salah satu cara mengamankan pesan rahasia dari pihak-pihak lain yang tidak
berkepentingan adalah steganografi. Salah satu metode yang paling banyak digunakan …
berkepentingan adalah steganografi. Salah satu metode yang paling banyak digunakan …
IMPLEMENTATION OF ELGAMAL AND LEAST SIGNIFICANT BIT (LSB) ALGORITHM FOR ENDING AND HIDDEN MESSAGES IN DIGITAL IMAGES
Basically, confidential data needs to be stored or conveyed in a certain way so that it is not
known by unauthorized foreign parties. And to overcome this problem, the science of …
known by unauthorized foreign parties. And to overcome this problem, the science of …