Chaos-based confusion and diffusion of image pixels using dynamic substitution

A Qayyum, J Ahmad, W Boulila, S Rubaiee… - IEEE …, 2020 - ieeexplore.ieee.org
The evolution of wireless and mobile communication from 0G to the upcoming 5G gives rise
to data sharing through the Internet. This data transfer via open public networks are …

Chaos-based diffusion for highly autocorrelated data in encryption algorithms

J Ahmad, SO Hwang - Nonlinear Dynamics, 2015 - Springer
In a single substitution box, the same regions (pixels) of an image are encrypted to one
unique symbol. To reduce this type of autocorrelation in data, chaos has been extensively …

Dynamic substitution and confusion-diffusion-based noise-resistive image encryption using multiple chaotic maps

MU Rehman, A Shafique, S Khalid, I Hussain - IEEE Access, 2021 - ieeexplore.ieee.org
The advancement in wireless communication has encouraged the process of data
transferring through the Internet. The process of data sharing via the Internet is prone to …

Combining RSA and audio steganography on personal computers for enhancing security

N Al-Juaid, A Gutub - SN Applied Sciences, 2019 - Springer
This paper proposed an enhanced system for securing sensitive text data on personal
computer benefitting from the combination of both techniques: cryptography and …

Blowfish–secured audio steganography

F Hemeida, W Alexan… - 2019 Novel Intelligent and …, 2019 - ieeexplore.ieee.org
Data security has become essential to provide secure communication that is free of attacks.
A combination of steganography and cryptography provides very secure communication …

From diffusion to confusion of RGB pixels using a new chaotic system for color image encryption

SB Mamia, P Puteaux, W Puech, K Bouallegue - IEEE Access, 2023 - ieeexplore.ieee.org
Over the past decade, the transmission of images over digital and social networks, as well
as their archiving on clouds, has increased dramatically. It has become necessary and …

Advantages and disadvantages of using cryptography in Steganography

A Hadipour, R Afifi - 2020 17th International ISC Conference on …, 2020 - ieeexplore.ieee.org
The use of cryptographic algorithms varies based on the type of application. Also have
different uses for steganography algorithms based on media type, format and capacity …

Logistic map-based image steganography scheme using combined LSB and PVD for security enhancement

S Prasad, AK Pal - Emerging Technologies in Data Mining and Information …, 2019 - Springer
In recent, the confidentiality of important data is indispensable for Internet users. Although
both the encryption and steganography schemes are well suited to protect the confidentiality …

[PDF][PDF] Architectural Design for Data Security in Cloud-based Big Data Systems

NI Ali, AG Memon, A Jamali - Baghdad Science Journal, 2024 - iasj.net
Abstract Architecture design of system is creative process after all. Non-functional
requirements and software architecture have a strong relationship. Security of system is one …

Interpolated Implicit Pixel-based Novel Hybrid Approach Towards Image Steganography

R Saini, K Joshi, K Punyani, R Yadav… - Recent Advances in …, 2023 - benthamdirect.com
Background: Steganography is the approach of camouflaging the covert object within
another cover object. This manuscript suggested a novel steganography approach to …