A review of data security and cryptographic techniques in IoT based devices

G Mustafa, R Ashraf, MA Mirza, A Jamil… - Proceedings of the 2nd …, 2018 - dl.acm.org
The idea of the Internet of Things (IoT) is to connect or give access to everything to the
Internet. IoT environment not only provides the facility of Human to Machine connectivity …

Enhancing AES using chaos and logistic map-based key generation technique for securing IoT-based smart home

Z Rahman, X Yi, M Billah, M Sumi, A Anwar - Electronics, 2022 - mdpi.com
The Internet of Things (IoT) has brought new ways for humans and machines to
communicate with each other over the internet. Though sensor-driven devices have largely …

A novel improvement with an effective expansion to enhance the MD5 hash function for verification of a secure E-document

AM Ali, AK Farhan - IEEE Access, 2020 - ieeexplore.ieee.org
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity.
The application of a Hash function can provide much protection and privacy and …

Blowfish–secured audio steganography

F Hemeida, W Alexan… - 2019 Novel Intelligent and …, 2019 - ieeexplore.ieee.org
Data security has become essential to provide secure communication that is free of attacks.
A combination of steganography and cryptography provides very secure communication …

Logistic tan map based audio steganography

MT Elkandoz, W Alexan - 2019 international conference on …, 2019 - ieeexplore.ieee.org
Steganography is the art of concealing a message within an unremarkable cover media in
order to avoid detection. This paper proposes using both cryptography for scrambling the …

Combined Strength of Steganography and Cryptography-A Literature Survey.

A Baby, H Krishnan - International Journal of Advanced …, 2017 - search.ebscohost.com
Cryptography and steganography are the 2 popular methods available to provide security.
The objective of cryptography is data protection and the objective of steganography is secret …

An efficient sound and data steganography based secure authentication system

D Datta, L Garg, K Srinivasan, A Inoue, GT Reddy… - 2021 - um.edu.mt
The prodigious advancements in contemporary technologies have also brought in the
situation of unprecedented cyber-attacks. Further, the pin-based security system is an …

Secure data transfer through internet using cryptography and image steganography

KC Nunna, R Marapareddy - 2020 SoutheastCon, 2020 - ieeexplore.ieee.org
Hacking became a big problem these days. Transmission of secure Data or communication
through internet turns to be challenging due to security concerns. In order to forestall these …

Achieving data integrity and confidentiality using image steganography and hashing techniques

A Hambouz, Y Shaheen, A Manna… - … conference on new …, 2019 - ieeexplore.ieee.org
Most existing steganography algorithms keen on achieving data confidentiality only by
embedding the data into a cover-media. This research paper introduced a new …

An encryption based on DNA and AES algorithms for hiding a compressed text in colored Image

QS Alsaffar, HN Mohaisen… - IOP Conference Series …, 2021 - iopscience.iop.org
The vast serious security challenges has created new secured ways of transmitting
information and reduce the chance of hackers to use their methods to analyse the …