The quantum internet: A synergy of quantum information technologies and 6G networks
The quantum internet is a cutting‐edge paradigm that uses the unique characteristics of
quantum technology to radically alter communication networks. This new network type is …
quantum technology to radically alter communication networks. This new network type is …
Encryption and steganography-based text extraction in IoT using the EWCTS optimizer
B Kumar Pandey, D Pandey, VK Nassa… - The Imaging Science …, 2021 - Taylor & Francis
This paper develops an effective encryption and steganography-based text extraction in IoT
using deep learning method. Initially, the input text and cover images are separately pre …
using deep learning method. Initially, the input text and cover images are separately pre …
A survey of recent advances in image steganography
Over the course of technological development, data security while transmission and storing
has always been a field of continuous advancements and key importance. In the recent …
has always been a field of continuous advancements and key importance. In the recent …
Least Significant Bit Steganography for Text and Image hiding
Digital image attestation is powerful regard for the digital rebellion. To fulfill this need,
different watermarking methods have been established. Though, it is hard to accomplish a …
different watermarking methods have been established. Though, it is hard to accomplish a …
An effective and enhanced RSA based public key encryption scheme (XRSA)
Cryptography is the mechanism of providing significant security services such as
confidentiality, authentication, and integrity. These services are essentially more important in …
confidentiality, authentication, and integrity. These services are essentially more important in …
Stegocrypt: A robust tri‐stage spatial steganography algorithm using TLM encryption and DNA coding for securing digital images
This research work presents a novel secured spatial steganography algorithm consisting of
three stages. In the first stage, a secret message is divided into three parts, each is …
three stages. In the first stage, a secret message is divided into three parts, each is …
A comprehensive study of digital image steganographic techniques
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …
modern digital arena calls for robust information hiding techniques and, thus, it has always …
[PDF][PDF] Hybrid information security system via combination of compression, cryptography, and image steganography
Today, the world is experiencing a new paradigm characterized by dynamism and rapid
change due to revolutions that have gone through information and digital communication …
change due to revolutions that have gone through information and digital communication …
Chaos based encryption technique for compressed h264/avc videos
MA El-Mowafy, SM Gharghory, MA Abo-Elsoud… - IEEE …, 2022 - ieeexplore.ieee.org
Saving videos streaming from the unlawful users became an urgent claim. Cryptography
and Steganography are the most important and indispensable processes to protect and …
and Steganography are the most important and indispensable processes to protect and …
Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism
This study presents a lightweight, secure audio steganography system for hiding text
messages for transmission over the Internet, with the aim of addressing the current problems …
messages for transmission over the Internet, with the aim of addressing the current problems …