Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Enhancing LSB using binary message size encoding for high capacity, transparent and secure audio steganography–an innovative approach
MM Mahmoud, HT Elshoush - IEEE Access, 2022 - ieeexplore.ieee.org
We propose a novel LSB-BMSE method that enhances LSB audio steganography. It uses an
innovative mechanism, Binaries of Message Size Encoding (BMSE), to embed a secret …
innovative mechanism, Binaries of Message Size Encoding (BMSE), to embed a secret …
A new fuzzy-DNA image encryption and steganography technique
Image encryption and steganography techniques are receiving a lot of interest and
investigations due to their high importance in multimedia communication systems. A novel …
investigations due to their high importance in multimedia communication systems. A novel …
Ameliorating LSB using piecewise linear chaotic map and one-time pad for superlative capacity, imperceptibility and secure audio steganography
HT Elshoush, MM Mahmoud - IEEE Access, 2023 - ieeexplore.ieee.org
Audio steganography hides a secret message into an audio. Existing techniques are lacking
in achieving high payload, imperceptibility in addition to robustness at the same time. They …
in achieving high payload, imperceptibility in addition to robustness at the same time. They …
Analysis review on spatial and transform domain technique in digital steganography
This paper presents several techniques used in digital steganography in term of spatial and
transform domain. Additionally, it analyses the performance and the metric evaluation of the …
transform domain. Additionally, it analyses the performance and the metric evaluation of the …
A high secure speech transmission using audio steganography and duffing oscillator
AS Hameed - Wireless Personal Communications, 2021 - Springer
Many steganography schemes seek to improve the transmission of important and sensitive
information through insecure channels. Audio steganography exploits audio files to transfer …
information through insecure channels. Audio steganography exploits audio files to transfer …
Recent Audio Steganography Trails and its Quality Measures
The term Steganography refers to the science that deals with hiding the secret messages
(text or anything else) inside an original cover file of the text, audio, video or image. The …
(text or anything else) inside an original cover file of the text, audio, video or image. The …
Enhanced Serpent algorithm using Lorenz 96 Chaos-based block key generation and parallel computing for RGB image encryption
HT Elshoush, BM Al-Tayeb, KT Obeid - PeerJ Computer Science, 2021 - peerj.com
This paper presents a new approach to enhance the security and performance of the
Serpent algorithm. The main concepts of this approach is to generate a sub key for each …
Serpent algorithm. The main concepts of this approach is to generate a sub key for each …
Hybrid audio steganography and cryptography method based on high Least Significant Bit (LSB) layers and one-time pad—a novel approach
SMH Alwahbani, HTI Elshoush - … : Extended and Selected Results from the …, 2018 - Springer
The paper proposes a novel chaos based audio steganography and cryptography method. It
is a higher Least Significant Bit (LSB) layers algorithm in which the secret message is …
is a higher Least Significant Bit (LSB) layers algorithm in which the secret message is …
[PDF][PDF] Text encryption using secure and expeditious multiprocessing SerpentCTR using logistic map.
HT Elshoush, DM Ahmed, AA Ishag… - … Journal of Electrical …, 2024 - researchgate.net
Unarguably performance is a critical factor to the success of any cipher. Al-Beit Serpent is
more secure than advanced encryption standard (AES), it faces limitations such as speed …
more secure than advanced encryption standard (AES), it faces limitations such as speed …
A Survey on Speech Encryption Using Chaos Map
EH Haseeb, SA Kadhim… - 2022 Fifth College of …, 2022 - ieeexplore.ieee.org
Due to the ease of compromising communication channels by attackers, Wireless
communications confront considerable challenges in having high security. As a result …
communications confront considerable challenges in having high security. As a result …