Internet of Things‐Based Data Hiding Scheme for Wireless Communication

A Shobanadevi, G Maragathm… - … and Mobile …, 2022 - Wiley Online Library
data strategies to tackle the risk of privacy breaches for digital content. In this study, a composite
reversible data hiding (CRDH) approach is … Sensitive data of the proposed approach are …

VRNFC-Stego: Data hiding technique based on VR images and NFC-enabled smartphones

A Ali, AHS Saad, AH Ismael - Procedia Computer Science, 2020 - Elsevier
… This paper presents a novel data hiding technique (VRNFC-Stego) in which this … smartphones
via VR images. The proposed technique solved one of the most challenging data hiding

Personal privacy protection framework based on hidden technology for smartphones

S Hong, C Liu, B Ren, Y Huang, J Chen - IEEE Access, 2017 - ieeexplore.ieee.org
… the sensitive data of the user as well as secure communications and can hide sensitive data
… To overcome these deficiencies that mobile devices present, we present a novel, practical …

An efficient privacy preserving data aggregation approach for mobile sensing

L Zhang, X Wang, J Lu, P Li… - Security and …, 2016 - Wiley Online Library
… In this paper, to preserve data privacy and integrity in mobile sensing, we present an
efficient data aggregation approach, in which information hiding and Paillier cryptosystem are …

[图书][B] Data hiding techniques in Windows OS: a practical approach to investigation and defense

NA Hassan, R Hijazi - 2016 - books.google.com
… ® OS NTFS file structure to conceal our data. Many data hiding techniques in this chapter
can be … This chapter gives insight on how hackers can use data hiding techniques to launch …

A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition

B Ma, K Du, J Xu, C Wang, J Li, L Zhou - Journal of Information Security and …, 2023 - Elsevier
… To evaluate the robustness of the proposed approach across diverse scenarios, we
conducted experiments utilizing popular smartphones as screen-shooting devices. To ensure the …

Fakemask: A novel privacy preserving approach for smartphones

L Zhang, Z Cai, X Wang - IEEE Transactions on Network and …, 2016 - ieeexplore.ieee.org
… For example, in a localization system [33], by using the information hiding and homomorphic
encryption scheme, a user can obtain her/his present location information with the help of …

Separable and error-free reversible data hiding in encrypted images

D Xu, R Wang - Signal Processing, 2016 - Elsevier
… With the rapid developments occurring in mobile internet and cloud storage, privacy and …
In this paper, we develop a more secure and reliable framework for reversible data hiding in …

Threats and benefits of data-hiding methods used in smart mobile devices

LK Rizzo - 2016 - search.proquest.com
… this thread that modern data hiding techniques are connected to smart mobile devices,
which is … over 50 mobile data hiding Apps… I find the number of new data hiding Apps, …

A crypto-steganography approach for hiding ransomware within HEVC streams in android IoT devices

I Almomani, A Alkhayer, W El-Shafai - Sensors, 2022 - mdpi.com
… , specifically smartphonessensitive data. Moreover, the authors of [34] have proposed a
new embedding algorithm in which they apply sequential multiples for LSB real-time data hiding