An introduction to image steganography techniques

AAJ Altaay, SB Sahib, M Zamani - … international conference on …, 2012 - ieeexplore.ieee.org
Steganography is a form of security technique through obscurity, the science and art of
hiding the existence of a message between sender and intended recipient. Steganography …

PSW statistical LSB image steganalysis

S Shojae Chaeikar, M Zamani, AB Abdul Manaf… - Multimedia Tools and …, 2018 - Springer
Steganography is the art and science of producing covert communications by concealing
secret messages in apparently innocent media, while steganalysis is the art and science of …

SIKM–a smart cryptographic key management framework

SS Chaeikar, A Ahmadi, S Karamizadeh… - Open Computer …, 2022 - degruyter.com
For a secure data transmission in symmetric cryptography, data are encrypted and
decrypted using an identical key. The process of creating, distributing, storing, deploying …

An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems

SS Chaeikar, M Alizadeh, MH Tadayon… - … Journal of Intelligent …, 2022 - Wiley Online Library
For secure communication in a distributed cooperation, generally, the data are encrypted
and decrypted using a symmetric key. The process of creating, distributing, storing …

[PDF][PDF] Innovative approach to improve hybrid cryptography by using DNA steganography

MRN Torkaman, NS Kazazi… - International Journal on …, 2012 - academia.edu
There exists a big demand for innovative secure electronic communications while the
expertise level of attackers increases rapidly and that causes even bigger demands and …

[PDF][PDF] Definitions and criteria of CIA security triangle in electronic voting system

S Chaeikar, M Jafari, H Taherdoost… - International Journal of …, 2012 - academia.edu
Abstract Confidentiality, Integrity, and Availability are three sides of the famous CIA security
triangle. Since the evoting systems are built from particular components, the CIA security …

[PDF][PDF] Security and performance evaluation of lightweight cryptographic algorithms in RFID

M Alizadeh, M Salleh, M Zamani, J Shayan… - Kos Island …, 2012 - academia.edu
This paper analyzes the security and performance of lightweight encryption algorithms,
which are used in RFID applications. Four of the most popular algorithms which are TEA …

Introduction of DNA computing in cryptography

S Namasudra, GC Deka - Advances of DNA computing in …, 2018 - taylorfrancis.com
This chapter provides an overview of cryptography and DNA computing. It presents all the
basics of cryptography and discusses background studies of DNA and the applications of …

[PDF][PDF] IKM-based security usability enhancement model

S Yazdanpanah, SS Chaeikar - IRACST-International Journal of …, 2012 - researchgate.net
Today by growth of hardware and software technologies new developed products are
delivering more facilities while their security configuration is becoming more and more …

Secure SMS transmission based on social network messages

SS Chaeikar, S Yazdanpanah… - International Journal of …, 2021 - inderscienceonline.com
Nowadays, short message communication has a wide range of applications in modern lives.
Authentication, announcements, reports, and personal communications are the common …