[PDF][PDF] Enhanced data security of communication system using combined encryption and steganography
Data security has become a paramount necessity and more obligation in daily life. Most of
our systems can be hacked, and it causes very high risks to our confidential files inside the …
our systems can be hacked, and it causes very high risks to our confidential files inside the …
Hiding data using efficient combination of RSA cryptography, and compression steganography techniques
Data compression is an important part of information security because compressed data is
more secure and easy to handle. Effective data compression technology creates efficient …
more secure and easy to handle. Effective data compression technology creates efficient …
Histogram shifting‐based quick response steganography method for secure communication
Steganography is a tool which allows the data for transmission by concealing secret
information in a tremendously growing network. In this paper, a novel technique quick …
information in a tremendously growing network. In this paper, a novel technique quick …
Secure text extraction from complex degraded images by applying steganography and deep learning
BK Pandey, D Mane, VKK Nassa, D Pandey… - … approach to modern …, 2021 - igi-global.com
This work's primary goal is to secure the transmission of text hidden within the cover image
using steganography over a public network of computers. Steganography is a powerful tool …
using steganography over a public network of computers. Steganography is a powerful tool …
An improved security and message capacity using AES and Huffman coding on image steganography
CA Sari, G Ardiansyah… - … Electronics and Control …, 2019 - telkomnika.uad.ac.id
Abstract Information security is very important and has been widely implemented.
Cryptography and steganography are two common methods that can be implemented to …
Cryptography and steganography are two common methods that can be implemented to …
[PDF][PDF] Increasing the efficiency of information transmission in communication channels
This paper discusses compression methods focused on data transmission over
communication channels. The characteristics of different algorithms for different types of …
communication channels. The characteristics of different algorithms for different types of …
Secure fusion of crypto-stegano based scheme for satellite image application
P Preethi, G Prakash - 2021 Asian Conference on Innovation in …, 2021 - ieeexplore.ieee.org
The transmission of satellite images in the Internet has elicited significant attention over the
past few years, due to the foreword of cloud and web based satellite information. Today …
past few years, due to the foreword of cloud and web based satellite information. Today …
Improved data hiding method for securing color images
Recently, data hiding techniques have become very popular in several vital applications,
especially in telemedicine. The reason for this is their ability to give good results such as …
especially in telemedicine. The reason for this is their ability to give good results such as …
Encryption and Steganography a secret data using circle shapes in colored images
Since the earliest times, people have used the encryption and hiding data to achieve a safe
and reliable transfer of important data. This paper propesed a new method for encrypting …
and reliable transfer of important data. This paper propesed a new method for encrypting …
Open image content disarm and reconstruction
With the advance in malware technology, attackers create new ways to hide their malicious
code from antivirus services. One way to obfuscate an attack is to use common files as cover …
code from antivirus services. One way to obfuscate an attack is to use common files as cover …