W Alexan, M El Beheiry… - International Journal of …, 2020 - journal.uob.edu.bh
This paper proposes a double–layer message security scheme. The message is first encrypted using AES-128 and is then embedded within a 3D image using least significant …
Counting-based secret sharing is becoming a vital efficient multimedia technique for raising the security of sensitive data especially when collective access to data are essential. Secret …
MT Elkandoz, W Alexan… - … Conference on Electrical …, 2019 - ieeexplore.ieee.org
This paper proposes a message security scheme that employs 2 layers. The first layer of security involves steganography while the second one involves cryptography. The secret …
It is predicted that cryptocurrencies will play an important role in the global economy. Therefore, it is prudent for us to understand the importance and monetary value of such …
Adaptive Matrix Pattern Steganography on RGB Images | Journal of Cyber Security and Mobility ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version) Skip to main content Skip to …
A Nilizadeh, ARN Nilchi - 2016 1st Conference on Swarm …, 2016 - ieeexplore.ieee.org
In this paper, a new steganography algorithm that combines two different steganography methods, namely Matrix Pattern (MP) and Least Significant Bit (LSB), is presented for RGB …
MAF Al-Husainy, DM Uliyan - International Journal of Technology, 2019 - researchgate.net
With the wide range use of digital communication technologies, the Internet has been commonly used as a channel for transmitting various images. Steganography practises have …
In this paper, a novel steganography algorithm based on an improved “Matrix Pattern”(MP) method is presented. In this process, firstly, an RGB image is divided into the non …
R Rejani, D Murugan… - ICTACT Journal on …, 2015 - pdfs.semanticscholar.org
One of the drawback of most of the existing steganography methods is that it alters the bits used for storing color information. Some of the examples include LSB or MSB based …