An introduction to image steganography techniques
Steganography is a form of security technique through obscurity, the science and art of
hiding the existence of a message between sender and intended recipient. Steganography …
hiding the existence of a message between sender and intended recipient. Steganography …
An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems
For secure communication in a distributed cooperation, generally, the data are encrypted
and decrypted using a symmetric key. The process of creating, distributing, storing …
and decrypted using a symmetric key. The process of creating, distributing, storing …
PSW statistical LSB image steganalysis
Steganography is the art and science of producing covert communications by concealing
secret messages in apparently innocent media, while steganalysis is the art and science of …
secret messages in apparently innocent media, while steganalysis is the art and science of …
[PDF][PDF] Innovative approach to improve hybrid cryptography by using DNA steganography
MRN Torkaman, NS Kazazi… - International Journal on …, 2012 - academia.edu
There exists a big demand for innovative secure electronic communications while the
expertise level of attackers increases rapidly and that causes even bigger demands and …
expertise level of attackers increases rapidly and that causes even bigger demands and …
Definitions and criteria of CIA security triangle in electronic voting system
H Taherdoost, S Chaeikar, M Jafari… - … Journal of Advanced …, 2013 - papers.ssrn.com
Abstract Confidentiality, Integrity, and Availability are three sides of the famous CIA security
triangle. Since the e-voting systems are built from particular components, the CIA security …
triangle. Since the e-voting systems are built from particular components, the CIA security …
[PDF][PDF] Security and performance evaluation of lightweight cryptographic algorithms in RFID
This paper analyzes the security and performance of lightweight encryption algorithms,
which are used in RFID applications. Four of the most popular algorithms which are TEA …
which are used in RFID applications. Four of the most popular algorithms which are TEA …
Introduction of DNA computing in cryptography
S Namasudra, GC Deka - Advances of DNA computing in …, 2018 - taylorfrancis.com
This chapter provides an overview of cryptography and DNA computing. It presents all the
basics of cryptography and discusses background studies of DNA and the applications of …
basics of cryptography and discusses background studies of DNA and the applications of …
[HTML][HTML] SIKM–a smart cryptographic key management framework
SS Chaeikar, A Ahmadi, S Karamizadeh… - Open Computer …, 2022 - degruyter.com
For a secure data transmission in symmetric cryptography, data are encrypted and
decrypted using an identical key. The process of creating, distributing, storing, deploying …
decrypted using an identical key. The process of creating, distributing, storing, deploying …
Secure SMS transmission based on social network messages
SS Chaeikar, S Yazdanpanah… - International Journal of …, 2021 - inderscienceonline.com
Nowadays, short message communication has a wide range of applications in modern lives.
Authentication, announcements, reports, and personal communications are the common …
Authentication, announcements, reports, and personal communications are the common …
Improving hybrid cryptosystems with DNA steganography
MR Najaf Torkaman, P Nikfard, N Sadat Kazazi… - Digital Enterprise and …, 2011 - Springer
There exists a big demand for secure electronic communications while the expertise level of
attackers increases rapidly and that causes even bigger demands and needs for an extreme …
attackers increases rapidly and that causes even bigger demands and needs for an extreme …