A crypto-steganography scheme for IoT applications based on bit interchange and crypto-system

S Alsamaraee, AS Ali - Bulletin of Electrical Engineering and Informatics, 2022 - beei.org
Image steganography and cryptography have been used widely due to the dramatic
evolution of the internet of things (IoT) and the simplicity of capturing and transferring digital …

Competitive Swarm Optimization with Encryption Based Steganography for Digital Image Security.

AA Eshmawi, SA Alsuhibany… - Computers …, 2022 - search.ebscohost.com
Digital image security is a fundamental and tedious process on shared communication
channels. Several methods have been employed for accomplishing security on digital image …

Iot-based motorbike ambulance: secure and efficient transportation

HH Mahmoud, AS Alghawli, MKM Al-shammari… - Electronics, 2022 - mdpi.com
The predilection for 5G telemedicine networks has piqued the interest of industry
researchers and academics. The most significant barrier to global telemedicine adoption is …

Multi level of encryption and steganography depending on Rabinovich Hyperchaotic System & DNA

ZN Al-Kateeb, M Jader - Multimedia Tools and Applications, 2024 - Springer
Securing confidential data is imperative in the modern digital era, where the escalating
challenges in data security underscore the urgency to provide a secure and efficient …

[HTML][HTML] Novel Steganographic Method Based on Hermitian Positive Definite Matrix and Weighted Moore–Penrose Inverses

S Pepić, M Saračević, A Selim, D Karabašević… - Applied Sciences, 2024 - mdpi.com
In this paper, we describe the concept of a new data-hiding technique for steganography in
RGB images where a secret message is embedded in the blue layer of specific bytes. For …

Blockchain in fifth-generation network and beyond: a survey

AS Mustafa, MA Al-Mashhadani, SA Jasim… - Bulletin of Electrical …, 2022 - beei.org
Abstract Fifth-generation (5G) technologies enable a wide range of vertical applications by
connecting heterogeneous equipment and machines, resulting in significantly improved …

[PDF][PDF] Performance Comparison of Xen AND Hyper-V in Cloud Computing While Using Cryptosystems.

WK Abdulraheem - International Journal of Advances in Soft Computing & …, 2022 - i-csrs.org
Cloud computing is internet-distributed computing model transferring processes from
personal computers or servers to cloud servers. Nowadays, security and performance of …

A Multi-Layer Data Security Model in Cloud

S Fatima, Y Saleem, S Hussain, B ul Din… - … on Emerging Trends …, 2022 - ieeexplore.ieee.org
The field of cloud computing is constantly growing. Users can use cloud to access the
resources of the computer system without directly maintaining them. In order to deal with …

[PDF][PDF] Multistage Encryption for Text Using Steganography and Cryptography

MM Msallam, F Aldoghan - Journal of Techniques, 2023 - iasj.net
One of the most crucial challenges in information and communication technology research is
to make more security for any system moving data via the internet. Where system security is …

High capacity double precision image steganography based on chaotic maps

SF Al Rubaie, MKM Al-Azawi - Bulletin of Electrical Engineering and …, 2024 - beei.org
Steganography is the process of hiding confidential information within non-secret
multimedia such that the 3 rd party cannot distinguish if there is a secret message in it or not …