SSII: secured and high-quality steganography using intelligent hybrid optimization algorithms for IoT

S Dhawan, C Chakraborty, J Frnda, R Gupta… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is a domain where the transfer of big data is taking place every single
second. The security of these data is a challenging task; however, security challenges can …

[PDF][PDF] Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats

MM Hashim, MSM Rahim, FA Johi… - … of Engineering & …, 2018 - researchgate.net
Recently, Steganography is an outstanding research area which used for data protection
from unauthorized access. Steganography is defined as the art and science of covert …

Triple-layer image security using a zigzag embedding pattern

S Farrag, W Alexan, HH Hussein - … International Conference on …, 2019 - ieeexplore.ieee.org
This paper proposes a triple-layer, high capacity, message security scheme. The first two
layers are of a cryptographic nature, whereas the third layer is of a steganographic nature. In …

An efficient steganography technique based on S2OA & DESAE model

S Dhawan, R Gupta, HK Bhuyan… - Multimedia Tools and …, 2023 - Springer
This paper gives a novel and efficient steganography technique based on hybrid algorithms
that improves the various important parameters like PSNR, MSE, IF, capacity, security. It …

Image Steganography using Cryptographic Primitives

Z Abbas, MQ Saeed - … on Cyber Warfare and Security (ICCWS), 2021 - ieeexplore.ieee.org
Information security has received exclusive consideration of numerous researchers in the
recent past. Various methods for securing sensitive information have been devised either …

[PDF][PDF] High capacity 2D and 3D reliable image steganography schemes

S Farrag, W Alexan, M Mashaly - 2019 - researchgate.net
Due to the tremendous advancements in digital communications and media, delivering a
secured message becomes a crucial task. Therefore, different methods have been …

[PDF][PDF] AES Encryption and 3D Image Steganography

A Elkhateeb - 2021 - researchgate.net
In the present time, security applications are vital for hiding data. Steganography and
cryptography provide higher security for the data between the sender and receiver. This …

[PDF][PDF] StegoCrypt: Arithmetic and Rudin–Shapiro Sequence–Based Bit–Cycling and 3DES

M El–Beheiry - 2019 - researchgate.net
Abstract Information security is the major concern now a days since number of internet users
is increasing and secret information is getting shared every second. This has also hiked …

[PDF][PDF] StegoCrypt: Geometric and Rudin–Shapiro Sequence–Based Bit–Cycling and Blowfish

K Sameeh - 2019 - researchgate.net
Steganography has been a hot topic for many years now occupying a great number of
researches that seek the best way to hide the data from other people. Steganography is the …

[PDF][PDF] StegoCrypt: Arithmetic and Rudin–Shapiro Sequence–Based Bit–Cycling and AES

S Yasser - 2019 - researchgate.net
This paper presents a double layer secure message scheme. The first layer consists of
cryptography. The second layer consists of steganography. Cryptography is where the data …