An introduction to image steganography techniques

AAJ Altaay, SB Sahib, M Zamani - … international conference on …, 2012 - ieeexplore.ieee.org
Steganography is a form of security technique through obscurity, the science and art of
hiding the existence of a message between sender and intended recipient. Steganography …

An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems

SS Chaeikar, M Alizadeh, MH Tadayon… - … Journal of Intelligent …, 2022 - Wiley Online Library
For secure communication in a distributed cooperation, generally, the data are encrypted
and decrypted using a symmetric key. The process of creating, distributing, storing …

PSW statistical LSB image steganalysis

S Shojae Chaeikar, M Zamani, AB Abdul Manaf… - Multimedia Tools and …, 2018 - Springer
Steganography is the art and science of producing covert communications by concealing
secret messages in apparently innocent media, while steganalysis is the art and science of …

[PDF][PDF] Innovative approach to improve hybrid cryptography by using DNA steganography

MRN Torkaman, NS Kazazi… - International Journal on …, 2012 - academia.edu
There exists a big demand for innovative secure electronic communications while the
expertise level of attackers increases rapidly and that causes even bigger demands and …

Definitions and criteria of CIA security triangle in electronic voting system

H Taherdoost, S Chaeikar, M Jafari… - … Journal of Advanced …, 2013 - papers.ssrn.com
Abstract Confidentiality, Integrity, and Availability are three sides of the famous CIA security
triangle. Since the e-voting systems are built from particular components, the CIA security …

[PDF][PDF] Security and performance evaluation of lightweight cryptographic algorithms in RFID

M Alizadeh, M Salleh, M Zamani, J Shayan… - Kos Island …, 2012 - academia.edu
This paper analyzes the security and performance of lightweight encryption algorithms,
which are used in RFID applications. Four of the most popular algorithms which are TEA …

Introduction of DNA computing in cryptography

S Namasudra, GC Deka - Advances of DNA computing in …, 2018 - taylorfrancis.com
This chapter provides an overview of cryptography and DNA computing. It presents all the
basics of cryptography and discusses background studies of DNA and the applications of …

[HTML][HTML] SIKM–a smart cryptographic key management framework

SS Chaeikar, A Ahmadi, S Karamizadeh… - Open Computer …, 2022 - degruyter.com
For a secure data transmission in symmetric cryptography, data are encrypted and
decrypted using an identical key. The process of creating, distributing, storing, deploying …

Secure SMS transmission based on social network messages

SS Chaeikar, S Yazdanpanah… - International Journal of …, 2021 - inderscienceonline.com
Nowadays, short message communication has a wide range of applications in modern lives.
Authentication, announcements, reports, and personal communications are the common …

Improving hybrid cryptosystems with DNA steganography

MR Najaf Torkaman, P Nikfard, N Sadat Kazazi… - Digital Enterprise and …, 2011 - Springer
There exists a big demand for secure electronic communications while the expertise level of
attackers increases rapidly and that causes even bigger demands and needs for an extreme …