The quantum internet: A synergy of quantum information technologies and 6G networks

GG Rozenman, NK Kundu, R Liu… - IET Quantum …, 2023 - Wiley Online Library
The quantum internet is a cutting‐edge paradigm that uses the unique characteristics of
quantum technology to radically alter communication networks. This new network type is …

Encryption and steganography-based text extraction in IoT using the EWCTS optimizer

B Kumar Pandey, D Pandey, VK Nassa… - The Imaging Science …, 2021 - Taylor & Francis
This paper develops an effective encryption and steganography-based text extraction in IoT
using deep learning method. Initially, the input text and cover images are separately pre …

A survey of recent advances in image steganography

A Kumar, R Rani, S Singh - Security and Privacy, 2023 - Wiley Online Library
Over the course of technological development, data security while transmission and storing
has always been a field of continuous advancements and key importance. In the recent …

Least Significant Bit Steganography for Text and Image hiding

S Sakshi, S Verma, P Chaturvedi… - 2022 3rd International …, 2022 - ieeexplore.ieee.org
Digital image attestation is powerful regard for the digital rebellion. To fulfill this need,
different watermarking methods have been established. Though, it is hard to accomplish a …

An effective and enhanced RSA based public key encryption scheme (XRSA)

R Imam, F Anwer, M Nadeem - International Journal of Information …, 2022 - Springer
Cryptography is the mechanism of providing significant security services such as
confidentiality, authentication, and integrity. These services are essentially more important in …

Stegocrypt: A robust tri‐stage spatial steganography algorithm using TLM encryption and DNA coding for securing digital images

W Alexan, E Mamdouh, A Aboshousha… - IET Image …, 2024 - Wiley Online Library
This research work presents a novel secured spatial steganography algorithm consisting of
three stages. In the first stage, a secret message is divided into three parts, each is …

A comprehensive study of digital image steganographic techniques

S Rahman, J Uddin, M Zakarya, H Hussain… - IEEE …, 2023 - ieeexplore.ieee.org
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …

[PDF][PDF] Hybrid information security system via combination of compression, cryptography, and image steganography

WA Awadh, AS Alasady… - International Journal of …, 2022 - faculty.uobasrah.edu.iq
Today, the world is experiencing a new paradigm characterized by dynamism and rapid
change due to revolutions that have gone through information and digital communication …

Chaos based encryption technique for compressed h264/avc videos

MA El-Mowafy, SM Gharghory, MA Abo-Elsoud… - IEEE …, 2022 - ieeexplore.ieee.org
Saving videos streaming from the unlawful users became an urgent claim. Cryptography
and Steganography are the most important and indispensable processes to protect and …

Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism

MA Al Sibahee, ZA Abduljabbar, C Luo, J Zhang… - Plos one, 2024 - journals.plos.org
This study presents a lightweight, secure audio steganography system for hiding text
messages for transmission over the Internet, with the aim of addressing the current problems …