A novel image steganography technique based on quantum substitution boxes
Substitution boxes play an essential role in designing secure cryptosystems. With the
evolution of quantum technologies, current data security mechanisms may be broken due to …
evolution of quantum technologies, current data security mechanisms may be broken due to …
A comprehensive review about image encryption methods
In today's technology world, data security has a great importance. Because each data type
has its own characteristics, there are various methods of providing this security. The main …
has its own characteristics, there are various methods of providing this security. The main …
[PDF][PDF] Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats
MM Hashim, MSM Rahim, FA Johi… - … of Engineering & …, 2018 - researchgate.net
Recently, Steganography is an outstanding research area which used for data protection
from unauthorized access. Steganography is defined as the art and science of covert …
from unauthorized access. Steganography is defined as the art and science of covert …
Triple-layer image security using a zigzag embedding pattern
This paper proposes a triple-layer, high capacity, message security scheme. The first two
layers are of a cryptographic nature, whereas the third layer is of a steganographic nature. In …
layers are of a cryptographic nature, whereas the third layer is of a steganographic nature. In …
An imperceptible LSB image hiding on edge region using DES encryption
Sending image in a plain form has a high risk for the data being vulnerable to steal. Thus,
due to reducing the risk, data security techniques should be implemented. Data security …
due to reducing the risk, data security techniques should be implemented. Data security …
Digital image signature using triple protection cryptosystem (RSA, Vigenere, and MD5)
RD Ardy, OR Indriani, CA Sari… - … Conference on Smart …, 2017 - ieeexplore.ieee.org
Authentication of digital media has been done with the various scheme, one of them is a
digital signature. The main reason the technique of digital signature appears on the …
digital signature. The main reason the technique of digital signature appears on the …
A good performance OTP encryption image based on DCT-DWT steganography
The security aspect is very important in data transmission. One way to secure data is with
steganography and cryptography. Surely research on this should continue to be developed …
steganography and cryptography. Surely research on this should continue to be developed …
Hybrid method using HWT-DCT for image watermarking
This paper proposed a hybrid method that had been solved both of these issues. We
proposed a combination of Discrete Cosine Transform (DCT) and Haar Wavelet Transform …
proposed a combination of Discrete Cosine Transform (DCT) and Haar Wavelet Transform …
QR code based color image stego-crypto technique using dynamic bit replacement and logistic map
P Mathivanan - Optik, 2021 - Elsevier
This paper uses a novel color image stego-crypto technique to enhance the capacity,
security and robustness of data embedding process. The proposed scheme uses a base64 …
security and robustness of data embedding process. The proposed scheme uses a base64 …
A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size
Many people have used the internet in daily communication. The rise of internet data theft
makes the security of data transmission becomes very important. Cryptography and …
makes the security of data transmission becomes very important. Cryptography and …