MM Hashim, MSM Rahim, FA Johi… - … of Engineering & …, 2018 - researchgate.net
Recently, Steganography is an outstanding research area which used for data protection from unauthorized access. Steganography is defined as the art and science of covert …
S Farrag, W Alexan, HH Hussein - … International Conference on …, 2019 - ieeexplore.ieee.org
This paper proposes a triple-layer, high capacity, message security scheme. The first two layers are of a cryptographic nature, whereas the third layer is of a steganographic nature. In …
S Dhawan, R Gupta, HK Bhuyan… - Multimedia Tools and …, 2023 - Springer
This paper gives a novel and efficient steganography technique based on hybrid algorithms that improves the various important parameters like PSNR, MSE, IF, capacity, security. It …
Z Abbas, MQ Saeed - … on Cyber Warfare and Security (ICCWS), 2021 - ieeexplore.ieee.org
Information security has received exclusive consideration of numerous researchers in the recent past. Various methods for securing sensitive information have been devised either …
Due to the tremendous advancements in digital communications and media, delivering a secured message becomes a crucial task. Therefore, different methods have been …
In the present time, security applications are vital for hiding data. Steganography and cryptography provide higher security for the data between the sender and receiver. This …
Abstract Information security is the major concern now a days since number of internet users is increasing and secret information is getting shared every second. This has also hiked …
Steganography has been a hot topic for many years now occupying a great number of researches that seek the best way to hide the data from other people. Steganography is the …
This paper presents a double layer secure message scheme. The first layer consists of cryptography. The second layer consists of steganography. Cryptography is where the data …