[PDF][PDF] Electronic Circuit Simulation in Cap Shaped 4D Chaotic Model with DOCX Encryption, Stenography and Watermarking

A Qureshi, NA Khan, S Raza - 2024 - scholar.archive.org
This research investigates the effects of model parameters and fractional order on a novel
mathematical model with tangent hyperbolic memristors. An analysis of bifurcations and …

An approach to cryptography based on neural network using image for public key generation

Y Fatma, R Wardoyo, H Mukhtar - AIP Conference Proceedings, 2023 - pubs.aip.org
Keys play an important role in cryptography. A random number generator is often used to
generate the key in cryptography. But there is no computation that really generates a …

A Dynamic Steganography Method for Web Images with Average RunLength-Coding

J Liu, Y Zhang - Journal of Computer Science Research, 2021 - journals.bilpubgroup.com
Web page has many redundancies, especially the dynamic html multimedia object. This
paper proposes a novel method to employ the commonly used image elements on web …

[PDF][PDF] A Deep Steganography Approach to secure Data Transmission in Ad-hoc Cloud Systems

AA Mawgoud - 2022 - researchgate.net
In the early days of digital transformation, the automation, scalability, and availability of cloud
computing made a big difference for business. Nonetheless, significant concerns have been …

RGB Based Secure Share Creation in Steganography with ECC and DNN

S Ahmad, MR Abidi - Applications of Artificial Intelligence and Machine …, 2022 - Springer
Image steganography is a technique for concealing sensitive data inside an image. Since
traditional image steganography encrypts sensitive data in the host image, the payload …

Cryptography Application on RGB Overlapping Block Based PVD Using AES

AM Elhanafi, T Tommy, R Siregar… - Sinkron: jurnal dan …, 2022 - jurnal.polgan.ac.id
Abstract Pixel Value Differencing is a data hiding method in digital images that uses the
difference in pixel values as a reference for inserting secret data bits. RGB Overlapping …

Steganalysis Techniques: A Systematic Review

CV Priscilla, V HemaMalini - Journal of Survey in Fisheries …, 2023 - sifisheriessciences.com
World at present is full of data. Data plays a major role in all aspects in development in any
field, future predictions, decision making etc. Securing data is very important not only to …

STEGANOGRAPHY CAPACITY ANALYSIS OF TEXT IN TEXT WITH SENTENCE STRUCTURE IN INDONESIAN

RF Siahaan, A Sitohang, I Febrian… - Jurnal Sistem Informasi …, 2022 - jurnal.unprimdn.ac.id
Data security issues become very important when the computer has been used as a
communication tool on a global network (internet). One method that is quite popular for …

[PDF][PDF] DECLARATION CERTIFICATE

A Bhattacharya - 2023 - naac.iem.edu.in
The segmentation of white blood cells (WBCs) is a critical step in medical image analysis for
the diagnosis of various disorders. Due to the variation in the shape, size, and intensity of …

An Insight into Image Steganography for Medical Informatics

A Durafe, V Patidar - Cloud Computing in Medical Imaging, 2023 - taylorfrancis.com
Information security has become one of the major challenges in the field of medical
informatics where a minute tempering in the digital footprint can cost a patient's life. Image …