[PDF][PDF] A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation.

AH Seddik, M Salah, G Behery, A El-harby… - … , Materials & Continua, 2023 - researchgate.net
The ability of any steganography system to correctly retrieve the secret message is the
primary criterion for measuring its efficiency. Recently, researchers have tried to generate a …

[PDF][PDF] A Novel Method for Bluetooth pairing using Steganography

MA Albahar, O Olawumi, K Haataja… - International Journal on …, 2017 - researchgate.net
There are two solutions in data security field for ensuring that only legitimate recipients will
have access to the intended data: Steganography and cryptography. These solutions can be …

Information Hiding Using Coverless Steganography System Based on Image Generation

MS Reda, GM Behery, AA El-harby… - Scientific Journal for …, 2022 - journals.ekb.eg
Image generation plays an important role for designing a robust coverless steganography
system able to face different information hiding challenges. This paper proposes an image …

An Overview of Steganography:“Hiding in Plain Sight”

AA Ali - Applied Video Processing in Surveillance and …, 2017 - igi-global.com
Nowadays, due to the increasing need for providing secrecy in an open environment such
as the internet, data hiding has been widely used. Steganography is one of the most …

A Novel Method for Bluetooth Pairing Using Steganography

AM Ali, O Olayemi, H Keijo, T Pekka - 2017 - erepo.uef.fi
There are two solutions in data security field for ensuring that only legitimate recipients will
have access to the intended data: Steganography and cryptography. These solutions can be …

Threats and benefits of data-hiding methods used in smart mobile devices

LK Rizzo - 2016 - search.proquest.com
Abstract This Capstone Project examined the impacts associated with the linking of smart
mobile devices and data-hiding applications. The research questions posed were designed …

[PDF][PDF] Cryptography Based MSLD

AA Ali, AH Ismail - Citeseer
In recent years, internet revolution resulted rapid advancement of internet has made
destination. Aside to this, it is easier to hacking at the same time. Digital wa protection of …

[PDF][PDF] Data Hiding over Mobile Phones using Socket Network Communication

AS Nori, SA Baker - … Journal of Computer Science Issues (IJCSI), 2013 - academia.edu
The mobile phone is considered as wireless means of communication produced by
sophisticated modern technology. After expanding use of mobile phones, establishing …