An aes double–layer based message security scheme

W Alexan, A Hamza, H Medhat - … International Conference on …, 2019 - ieeexplore.ieee.org
Nowadays, the Achilles heel of any software system that deals with data communication
and/or storage on a cloud is the security of information being handled. However, modern …

A 3des double–layer based message security scheme

N Adam, M Mashaly, W Alexan - 2019 2nd International …, 2019 - ieeexplore.ieee.org
Nowadays, there are hundreds of applications that need to secure their transmission, where
a lot of techniques were implemented and applied for this reason. Attackers are always …

Security through blowfish and lsb bit–cycling with mathematical sequences

W Alexan, F Hemeida - 2019 Signal Processing: Algorithms …, 2019 - ieeexplore.ieee.org
Recently, lots of research work and papers are focusing on the combination of
steganography and cryptography. Steganography conceals the presence of a secret …

Sequence-based bit-cycling in double layer message security

W Alexan, H Medhat, A Hamza… - 2018 Advances in …, 2018 - ieeexplore.ieee.org
This paper proposes two different implementations of a double-layer message security
scheme. In both schemes, the first layer is of a cryptographic nature, employing the AES …

[PDF][PDF] Digital Rights Management of Image Content via LSB Embedding and Prime Number Sequence

A Bahaa - 2023 - researchgate.net
This paper will discuss digital rights management which ensures the confidentiality and
privacy of digital content. Furthermore, steganography will be discussed along with its two …

[PDF][PDF] Digital Rights Management of Image Content via LSB Embedding and Geomatric Sequence

J Yasser - 2023 - researchgate.net
Sending a protected message in an environment where attackers are searching for any
pertinent information has become an inescapable task as a consequence of the …

[PDF][PDF] High capacity 2D and 3D reliable image steganography schemes

S Farrag, W Alexan, M Mashaly - 2019 - researchgate.net
Due to the tremendous advancements in digital communications and media, delivering a
secured message becomes a crucial task. Therefore, different methods have been …

[PDF][PDF] Stegocrypt: Arithmetic and rudin–shapiro sequence–based bit–cycling and blowfish

FE Hemeida - 2019 - researchgate.net
Recently, lots of research work and papers are focusing on the combination of
steganography and cryptography. Steganography conceals the presence of a secret …

[PDF][PDF] AES Encryption and 3D Image Steganography

A Elkhateeb - 2021 - researchgate.net
In the present time, security applications are vital for hiding data. Steganography and
cryptography provide higher security for the data between the sender and receiver. This …

[PDF][PDF] Information Security Through Image Processing: Chaotic Functions and 3D Image Steganography

E Mamdouh - 2021 - researchgate.net
Abstract Information security plays an important role in each side of the data technology.
This thesis proposes two proposed schemes. The first scheme is a double layer message …