[PDF][PDF] Data Encryption Technique based on Enhancement of Blowfish Algorithm in Comparison of DES & DCT Methods

V Singhal, D Singh, SK Gupta - Int. J. Sci. Res. in Computer …, 2023 - iftmuniversity.ac.in
Accepted: 17/May/2023; Published: 30/Jun/2023.| DOI: https://doi. org/10.26438/ijsrcse/
v11i3. 1621 Abstract—Cryptographic methods or techniques are mathematical operations …

Steganographic approach to enhance the data security in public cloud

S Prabu, G Ganapathy - International Journal of Computer …, 2020 - inderscienceonline.com
Steganography is the claim to fame of disguising how correspondence is happening, by
hiding information in other information. As picture encryption is a quickly creating innovation …

Fighting Uphill Battles: Improvements in Personal Data Privacy

DM Sommer - 2021 - research-collection.ethz.ch
With the rise of modern information technology and the Internet, the worldwide
interconnectivity is resulting in a massive collection and evaluation of potentially sensitive …

Deniable upload and download via passive participation

D Sommer, A Dhar, L Malisa, E Mohammadi… - … USENIX Symposium on …, 2019 - usenix.org
Downloading or uploading controversial information can put users at risk, making them
hesitant to access or share such information. While anonymous communication networks …

[PDF][PDF] Optimalisasi Steganografi Pada File Flv Memanfaatkan Metode Injected At End Of All Video Tag Dengan Penambahan Kompresi

D Arraziqi, FX Ferdinandus - Seminar Nasional Inovasi dalam …, 2015 - ideatech.stts.edu
Proses steganografi pada FLV sering kali mengalami kendala. Kendala ini berupa kapasitas
file stego yang besar menyulitkan untuk diembedkan ke dalam file video yang berkapasitas …

CoverUp: Privacy Through" Forced" Participation in Anonymous Communication Networks

D Sommer, A Dhar, L Malisa, E Mohammadi… - Cryptology ePrint …, 2017 - eprint.iacr.org
The privacy guarantees of anonymous communication networks (ACNs) are bounded by the
number of participants. As a consequence, an ACN can only achieve strong privacy …

[PDF][PDF] Blowfish Algorithm-An Efficient Data Encryption Technique to Ensure Data Confidentiality

D Harinath, A Patil, P Kirubakaran, MVR Murthy… - jet-m.com
As technology continues to advance, the importance of secure communication systems will
only increase. Due to quick growth of networks, information security becomes more …

Literature review on stegnography techniques used in video

R Yadav - International Journal for Research Publication and …, 2021 - jrps.shodhsagar.com
In recent days, security is a major concern in the media owing to Internet growth and
multimedia material, for example audio, picture, video, etc. Security concerns should be …

[PDF][PDF] MP3 Audio Steganography Technique Using Extended Least Significant Bit

MSM Atoum - 2014 - eprints.utm.my
Audio Steganography is the process of concealing secret messages into audio file. The goal
for using audio steganography is to avoid drawing suspicion to the transmission of the secret …

[PDF][PDF] Hybridization of Cryptography and Steganography for Information Security

O JN, JAC Hampo, CL Okpalla, CG Onukwugha - academia.edu
Over the years, millions of data and information in transit have been abused, compromised
or lost to cybercriminals/hackers due to inefficient security measures adopted during data …