A crypto-steganography scheme for IoT applications based on bit interchange and crypto-system
S Alsamaraee, AS Ali - Bulletin of Electrical Engineering and Informatics, 2022 - beei.org
Image steganography and cryptography have been used widely due to the dramatic
evolution of the internet of things (IoT) and the simplicity of capturing and transferring digital …
evolution of the internet of things (IoT) and the simplicity of capturing and transferring digital …
Competitive Swarm Optimization with Encryption Based Steganography for Digital Image Security.
AA Eshmawi, SA Alsuhibany… - Computers …, 2022 - search.ebscohost.com
Digital image security is a fundamental and tedious process on shared communication
channels. Several methods have been employed for accomplishing security on digital image …
channels. Several methods have been employed for accomplishing security on digital image …
Iot-based motorbike ambulance: secure and efficient transportation
The predilection for 5G telemedicine networks has piqued the interest of industry
researchers and academics. The most significant barrier to global telemedicine adoption is …
researchers and academics. The most significant barrier to global telemedicine adoption is …
Multi level of encryption and steganography depending on Rabinovich Hyperchaotic System & DNA
ZN Al-Kateeb, M Jader - Multimedia Tools and Applications, 2024 - Springer
Securing confidential data is imperative in the modern digital era, where the escalating
challenges in data security underscore the urgency to provide a secure and efficient …
challenges in data security underscore the urgency to provide a secure and efficient …
[HTML][HTML] Novel Steganographic Method Based on Hermitian Positive Definite Matrix and Weighted Moore–Penrose Inverses
In this paper, we describe the concept of a new data-hiding technique for steganography in
RGB images where a secret message is embedded in the blue layer of specific bytes. For …
RGB images where a secret message is embedded in the blue layer of specific bytes. For …
Blockchain in fifth-generation network and beyond: a survey
Abstract Fifth-generation (5G) technologies enable a wide range of vertical applications by
connecting heterogeneous equipment and machines, resulting in significantly improved …
connecting heterogeneous equipment and machines, resulting in significantly improved …
[PDF][PDF] Performance Comparison of Xen AND Hyper-V in Cloud Computing While Using Cryptosystems.
WK Abdulraheem - International Journal of Advances in Soft Computing & …, 2022 - i-csrs.org
Cloud computing is internet-distributed computing model transferring processes from
personal computers or servers to cloud servers. Nowadays, security and performance of …
personal computers or servers to cloud servers. Nowadays, security and performance of …
A Multi-Layer Data Security Model in Cloud
The field of cloud computing is constantly growing. Users can use cloud to access the
resources of the computer system without directly maintaining them. In order to deal with …
resources of the computer system without directly maintaining them. In order to deal with …
[PDF][PDF] Multistage Encryption for Text Using Steganography and Cryptography
MM Msallam, F Aldoghan - Journal of Techniques, 2023 - iasj.net
One of the most crucial challenges in information and communication technology research is
to make more security for any system moving data via the internet. Where system security is …
to make more security for any system moving data via the internet. Where system security is …
High capacity double precision image steganography based on chaotic maps
Steganography is the process of hiding confidential information within non-secret
multimedia such that the 3 rd party cannot distinguish if there is a secret message in it or not …
multimedia such that the 3 rd party cannot distinguish if there is a secret message in it or not …