Double layer security using crypto-stego techniques: a comprehensive review

A Jan, SA Parah, M Hussan, BA Malik - Health and Technology, 2022 - Springer
Recent advancement in the digital technology and internet has facilitated usage of
multimedia objects for data communication. However, interchanging information through the …

Confidentiality considerations: multimedia signals transmission over different wireless channels utilized efficient secured model

SS Nassar, MAM El-Bendary - Multimedia Tools and Applications, 2022 - Springer
The confidentiality of highly-sensitive multimedia signals is considered in this paper, it can
be enhanced by efficient secured model utilizing several-layer security algorithms. The …

A secured lossless visual secret sharing for color images using arnold transform

BK Sharobim, SK Abd-El-Hafiz… - 2022 International …, 2022 - ieeexplore.ieee.org
Nowadays, with the rapid growth in information, a fast and secure method is eagerly needed
to share images.(n, n)-Visual Secret Sharing (VSS) is used to share a secret image into n …

Graph Crypto‐Stego System for Securing Graph Data Using Association Schemes

A Sabharwal, P Yadav, K Kumar - Journal of Applied …, 2024 - Wiley Online Library
Cryptography has recently become a critical area to research and advance in order to
transmit information safely and securely among various entities, especially when the …

An approach for mitigating cognitive load in password management by integrating QR codes and steganography

G Balayogi, K KS - Security and Privacy - Wiley Online Library
The proliferation of digital services and the imperative for secure authentication have
necessitated the management of an expanding array of passwords, imposing a significant …

[PDF][PDF] Dual Level Security Scheme (DLSS) Using RGB Layer Cryptography and Audio Steganography for Secret Image Transmission in Unsecure Medium

PL Chithra, R Aparna - Indian Journal …, 2023 - sciresol.s3.us-east-2.amazonaws …
Objectives: Recent trend depicts a steep hike in the value of data. Data in all forms are
vulnerable and especially multimedia data are fascinated by hackers Hence, strong security …

An Approach on Image Steganography Based on the Least Significant Bit Algorithm

KC Murugan, D Samanta, M Goswami - Handbook of Research on …, 2022 - igi-global.com
Steganography is the practice of communication by covering information within other
information mediums. The goal of steganography is to hide information in such a way that it …

Association Schemes in Steganography

R Sharma, A SABHARWAL… - Available at SSRN …, 2023 - papers.ssrn.com
In this paper we propose a new Crypto-Stegano system by using Association schemes over
finite abelian groups associated with Arnold Tranform and then hiding the encrypted data …