The implication of metaverse in the traditional medical environment and healthcare sector: applications and challenges

MA Farahat, A Darwish, AE Hassanien - The Future of Metaverse in the …, 2023 - Springer
There are a lot of studies that have been presenting the idea of the metaverse since 2021.
It's the term for the next-generation mobile computing platform, which will be extensively …

[HTML][HTML] Hiding patients' medical reports using an enhanced wavelet steganography algorithm in DICOM images

MA Ahmad, M Elloumi, AH Samak… - Alexandria Engineering …, 2022 - Elsevier
In the latest years, there is an increasing emphasis on DICOM medical images, especially in
digital medical images transmission to e-health services. Besides, the confidentiality and …

[HTML][HTML] Enhancing data security: A cutting-edge approach utilizing protein chains in cryptography and steganography

NA Mawla, HK Khafaji - Computers, 2023 - mdpi.com
Nowadays, with the increase in cyber-attacks, hacking, and data theft, maintaining data
security and confidentiality is of paramount importance. Several techniques are used in …

Advancements in Modern Steganography Techniques for Enhanced Data Security: A Comprehensive Review

S Bohra, C Naik, R Batra, K Popat… - 2024 11th International …, 2024 - ieeexplore.ieee.org
Information security has become a major concern in today's digital world with the rapid
growth of the internet. To confront this challenge, various techniques like cryptography and …

Adaptive Image Steganography Domain: A Review of the Recent Works

RS Hameed, FF Hasan, AS Abdulbaqi - Doctoral Symposium on …, 2024 - Springer
A steganogram is a technique for hiding a message in a cover image; the message could be
an image, an audio recording, a text, or even a video. As a result of embedding, the secret …

[PDF][PDF] Securing data using deep hiding selected least significant bit and adaptive swarm algorithm

BII Aljidi, S Perumal, SA Pitchay - Indonesian Journal of Electrical …, 2022 - academia.edu
The emphasis on data protection is improved in particular with respect to the transmission
protocols utilized. Different research on numerous data protection areas such as …