Data security in cloud computing using steganography: a review

AY AlKhamese, WR Shabana… - … on innovative trends in …, 2019 - ieeexplore.ieee.org
Cloud computing is one of the largest developments in the field of information technology
during recent years. It is a service oriented computing which offers everything as a service …

A secure image steganography algorithm based on least significant bit and integer wavelet transform

E Emad, A Safey, A Refaat, Z Osama… - Journal of Systems …, 2018 - ieeexplore.ieee.org
The rapid development of data communication in modern era demands secure exchange of
information. Steganography is an established method for hiding secret data from an …

Secure 2d image steganography using recamán's sequence

S Farrag, W Alexan - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
This paper presents a double-layer secure message scheme. The first layer is of a
cryptographic nature, where the Data Encryption Standard (DES), CAST5 or Blowfish is …

Double-layer image security scheme with aggregated mathematical sequences

MT Elkandoz, W Alexan… - … conference on advanced …, 2019 - ieeexplore.ieee.org
Information security has been a major concern since the evolution of technology. Nowadays,
internet users' are increasing and their information is being shared almost every second …

Triple-layer image security using a zigzag embedding pattern

S Farrag, W Alexan, HH Hussein - … International Conference on …, 2019 - ieeexplore.ieee.org
This paper proposes a triple-layer, high capacity, message security scheme. The first two
layers are of a cryptographic nature, whereas the third layer is of a steganographic nature. In …

An improved LSB based image steganography technique for RGB images

A Singh, H Singh - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
Steganography is the art and science of invisible communication by hiding secret
information into other sources of information like text, video, audio, image etc. In image …

An aes double–layer based message security scheme

W Alexan, A Hamza, H Medhat - … International Conference on …, 2019 - ieeexplore.ieee.org
Nowadays, the Achilles heel of any software system that deals with data communication
and/or storage on a cloud is the security of information being handled. However, modern …

A review on spatial domain technique based on image steganography

N Sharma, U Batra - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
As we are moving towards a digital world with rapid strides and advancements in the field of
communication of information with effective use of technology, it becomes mandatory that …

A 3des double–layer based message security scheme

N Adam, M Mashaly, W Alexan - 2019 2nd International …, 2019 - ieeexplore.ieee.org
Nowadays, there are hundreds of applications that need to secure their transmission, where
a lot of techniques were implemented and applied for this reason. Attackers are always …

[PDF][PDF] 2-leyer security system for hiding sensitive text data on personal computers

NA Al-Otaibi, AA Gutub - Lecture Notes on Information Theory, 2014 - drive.uqu.edu.sa
High security system suitable to hide sensitive text-data on personal computer is proposed
and implemented. The system hiding techniques involves AES cryptography followed by …