LSB substitution image steganography based on randomized pixel selection and one-time pad encryption

M C. Alipour, B D. Gerardo, R P. Medina - Proceedings of the 2020 2nd …, 2020 - dl.acm.org
Digital communication is an inseparable part of almost every individual and involved
community on the plant. Different algorithms use to secure the transmission media such as …

“Every Dog Has His Day”: Competitive-Evolving-Committee Proactive Secret Sharing With Capability-Based Encryption

C Yan, H Xu, P Li - International Journal of Information Security and …, 2023 - igi-global.com
This article proposes a competitive-evolving-committee proactive secret sharing. Every
participant in the system has the opportunity to become a member of the holding committee …

Data Hiding in the Multi-Cloud Environment by Product Cipher-Based Distributed Steganography

SS Hashmi, AAK Mohammad, AM Abdul, C Atheeq… - 2023 - researchsquare.com
The paper presents a highly effective steganography scheme designed to protect hidden
data in the cloud. The proposed scheme addresses the challenges of concealing data in a …

Accommodating secret sharing technique for personal remembrance via steganography

A Gutub, M Al-Ghamdi - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
The secret sharing scheme is a data security tool that provide the reliability and robustness
for multi-user authentication systems. This work focus on improving counting-based secret …

[PDF][PDF] Comparative analysis of the spatial domain in digital image steganography

R Selvamani, Y Yusoff, R Alwee, SM Yusuf… - 2023 - elsp-homepage.oss-cn-hongkong …
Digital steganography is a new and extremely demanding method for transmitting
information securely over the internet while employing a covert device. Since its inception in …

[PDF][PDF] IMAGE BASED STEGANOGRAPHY TO FACILITATE IMPROVING HIDING CONTENT CAPACITY AND OPTIMIZED SECURITY

S Chandra - academia.edu
Steganography is an art of writing for conveying message inside another media in a secret
way that can only be detected by its intended recipient. There are security agents who would …

[PDF][PDF] Regulating watermarking semi-authentication of multimedia audio via counting-based secret sharing Sayıma dayalı gizli paylaşım yoluyla multimedya sesinin …

A GUTUB - jag.journalagent.com
Öz Watermarking is the process of embedding specific data to prove ownership copyright
authentication. It is needed whenever media-files are used without proper permission is …

[PDF][PDF] Distributed Data Hiding in A Single Cloud Storage Environment

SW MOSSEBO, LM METCHEKA, R NDOUNDAM - 2021 - scholar.archive.org
Abstract Information has always constituted a prized commodity over time, with the strong
globalization of exchanges and communications. The provenance, acquisition, protection …