A comprehensive review about image encryption methods

C Tiken, R Samlı - Harran Üniversitesi Mühendislik Dergisi, 2022 - dergipark.org.tr
In today's technology world, data security has a great importance. Because each data type
has its own characteristics, there are various methods of providing this security. The main …

CASDC: a cryptographically secure data system based on two private key images

A Al-Hyari, I Al-Taharwa, B Al-Ahmad, Z Alqadi - IEEE Access, 2022 - ieeexplore.ieee.org
Colored digital images are one of the most important types of digital data to be used in many
vital applications, which require a safe way to protect them from hacking operations and the …

[PDF][PDF] A novel technique for data steganography

AY Hindi, MO Dwairi, ZA AlQadi - Engineering, Technology & …, 2019 - academia.edu
In this paper, a novel stego-method will be introduced, which can be used to hide any secret
message in any holding color image. The proposed method will be implemented and tested …

A combined chaotic system for speech encryption

S Mokhnache, MEH Daachi, T Bekkouche… - … , Technology & Applied …, 2022 - etasr.com
This paper presents a speech encryption scheme by performing a combination of modified
chaotic maps inspired by classic logistic and cubic maps. The main idea was to enhance the …

[PDF][PDF] Efficient method to message-image cryptography using reordered image-key

RJ Rasras, MRA Sara, Z Alqadi - Traitement du Signal, 2023 - researchgate.net
Accepted: 30 January 2023 Color image may be secret or holding secret data, also secret
messages may be so confidential. To protect these data, we have to use a simple and …

[PDF][PDF] Enhanced Efficiency and Security in LSB2 Steganography: Burst Embedding and Private Key Integration.

RJ Rasras, MR Abu Sara, Z Alqadi - Traitement du Signal, 2023 - researchgate.net
In the realm of digital colour image steganography, the utilisation of an image key for the
extraction of essential covering stego-bytes from predetermined secret positions was …

A modified symmetric local binary pattern for image features extraction

MO Dwairi - TELKOMNIKA (Telecommunication Computing …, 2020 - telkomnika.uad.ac.id
The process of identifying images and patterns is one of the most important processes of
digital image processing, which is used in many applications such as fingerprint recognition …

Image segmentation to secure lsb2 data steganography

HG Zaini - Engineering, Technology & Applied Science Research, 2021 - etasr.com
A digital color image usually has a high resolution, thus its size is good enough and the
image can be used as a covering (holding) image to hide secrete messages (short and …

[PDF][PDF] Simplified and Improved LSB2 (SILSB2) Method of Secret Message Steganography

Z Alqadi - International Journal of Computer Science and Mobile …, 2023 - researchgate.net
A simplified and improved method based on LSB2 (SILSB2) method of secret message
steganography will be introduced. The method will simplify the message hiding and …

[PDF][PDF] International Journal of Advanced Trends in Computer Science and Engineering

AM Alqudah, H Alquraan, IA Qasmieh, A Alqudah… - International …, 2019 - arxiv.org
Deep Learning is the newest and the current trend of the machine learning field that paid a
lot of the researchers' attention in the recent few years. As a proven powerful machine …