A review on recognition-based graphical password techniques

A Islam, LY Por, F Othman, CS Ku - … 2018, Kota Kinabalu, Malaysia, 29-30 …, 2019 - Springer
This paper reviews the recognition-based graphical password system. Twenty-five
recognition-based graphical password systems are studied and analyzed with regards to …

Graphical password: prevent shoulder-surfing attack using digraph substitution rules

LY Por, CS Ku, A Islam, TF Ang - Frontiers of Computer Science, 2017 - Springer
In this paper, a new scheme that uses digraph substitution rules to conceal the mechanism
or activity required to derive password-images is proposed. In the proposed method, a user …

[PDF][PDF] A review study on unique way of information hiding: Steganography

M Zeeshan, S Ullah, S Anayat, RG Hussain… - International Journal on …, 2017 - academia.edu
Internet communication become the need of entire world, today internet is like a recourse of
power that is used to run human life. The users, as a layman, may not know that internet, a …

Image steganography in securing sound file using arithmetic coding algorithm, triple data encryption standard (3DES) and modified least significant bit (MLSB)

AB Nasution, S Efendi, S Suwilo - Journal of Physics: Conference …, 2018 - iopscience.iop.org
The amount of data inserted in the form of audio samples that use 8 bits with LSB algorithm,
affect the value of PSNR which resulted in changes in image quality of the insertion (fidelity) …

Preventing Shoulder‐Surfing Attack with the Concept of Concealing the Password Objects' Information

PF Ho, YHS Kam, MC Wee… - The Scientific World …, 2014 - Wiley Online Library
Traditionally, picture‐based password systems employ password objects (pictures/icons/
symbols) as input during an authentication session, thus making them vulnerable to …

Performance analysis of AES-Blowfish hybrid algorithm for security of patient medical record data

R Siregar - Journal of Physics: Conference Series, 2018 - iopscience.iop.org
A file security is one method to protect data confidentiality, integrity and information security.
Cryptography is one of techniques used to secure and guarantee data confidentiality by …

Enhancing Data Protection in Digital Communication: A Novel Method of Combining Steganography and Encryption

KH Abuhmaidan, MA Al-Share… - KSII Transactions on …, 2024 - koreascience.kr
In today's highly digitized landscape, securing digital communication is paramount due to
threats like hacking, unauthorized data access, and network policy violations. The response …

Implementasi Steganografi Text To Image Menggunakan Metode One Bit Least Significant Bit Berbasis Android

AA Fikhri, H Hendrawaty - Jurnal Infomedia: Teknik Informatika …, 2018 - e-jurnal.pnl.ac.id
Informasi merupakan hal yang sangat penting dan berharga, dewasa ini informasi sering
dipertukarkan melalui internet. Kemajuan teknologi smartphone terutama smartphone …

Steganographic approach to enhancing secure data communication using contours and clustering

G Manikandan, R Bala Krishnan… - Multimedia Tools and …, 2018 - Springer
With the increasing developments in communication technologies, there is a need for
extremely robust information exchange, which is the core aim of steganography …

Steganography: A flexible embedded randomization technique

A Khaled H, K Ahmad K, A Maryam - KSII Transactions on Internet …, 2023 - koreascience.kr
With the expansion of digital communication networks, a considerable number of
randomization techniques have been invented and implemented to enhance the different …