Secret sharing: A comprehensive survey, taxonomy and applications
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …
magnificent development in information and communication technology. Likewise …
[HTML][HTML] Hiding patients' medical reports using an enhanced wavelet steganography algorithm in DICOM images
In the latest years, there is an increasing emphasis on DICOM medical images, especially in
digital medical images transmission to e-health services. Besides, the confidentiality and …
digital medical images transmission to e-health services. Besides, the confidentiality and …
Enhancing LSB using binary message size encoding for high capacity, transparent and secure audio steganography–an innovative approach
MM Mahmoud, HT Elshoush - IEEE Access, 2022 - ieeexplore.ieee.org
We propose a novel LSB-BMSE method that enhances LSB audio steganography. It uses an
innovative mechanism, Binaries of Message Size Encoding (BMSE), to embed a secret …
innovative mechanism, Binaries of Message Size Encoding (BMSE), to embed a secret …
A coverless audio steganography based on generative adversarial networks
J Li, K Wang, X Jia - Electronics, 2023 - mdpi.com
Traditional audio steganography by cover modification causes changes to the cover features
during the embedding of a secret, which is easy to detect with emerging neural-network …
during the embedding of a secret, which is easy to detect with emerging neural-network …
An efficient sound and data steganography based secure authentication system
The prodigious advancements in contemporary technologies have also brought in the
situation of unprecedented cyber-attacks. Further, the pin-based security system is an …
situation of unprecedented cyber-attacks. Further, the pin-based security system is an …
A novel non-equilibrium hyperchaotic system and application on color image steganography with FPGA implementation
J Sun, H Cai, Z Gao, C Wang, H Zhang - Nonlinear Dynamics, 2023 - Springer
In this paper, a new hyperchaotic system without an equilibrium point is proposed and
analyzed. A novel steganography technique is advanced by combining the hyperchaotic …
analyzed. A novel steganography technique is advanced by combining the hyperchaotic …
A Noise‐Tolerant Audio Encryption Framework Designed by the Application of S8 Symmetric Group and Chaotic Systems
The recent decade has witnessed an exponential surge of digital content, especially
multimedia and its applications. The security requirements of these innovative platforms …
multimedia and its applications. The security requirements of these innovative platforms …
[PDF][PDF] The Evaluation of Image Messages in MP3 Audio Steganography Using Modified Low-Bit Encoding
IF Ashari - Evaluation, 2021 - researchgate.net
Information security is an important aspect of maintaining the confidentiality of information.
One type of document kept secret is images (. jpg,. png,. gif, dan. bmp). MP3 audio files are …
One type of document kept secret is images (. jpg,. png,. gif, dan. bmp). MP3 audio files are …
[HTML][HTML] Linguistic secret sharing via ambiguous token selection for IOT security
The proliferation of Internet of Things (IoT) devices has introduced significant security
challenges, including weak authentication, insufficient data protection, and firmware …
challenges, including weak authentication, insufficient data protection, and firmware …
Audio encryption framework using the laplace transformation
Digital information, especially multimedia and its applications, has grown exponentially in
recent years. It is important to strengthen sophisticated encryption algorithms due to the …
recent years. It is important to strengthen sophisticated encryption algorithms due to the …