Cloud and edge computing-based computer forensics: Challenges and open problems

V Prakash, A Williams, L Garg, C Savaglio, S Bawa - Electronics, 2021 - mdpi.com
In recent years, there has been a dramatic change in attitude towards computers and the
use of computer resources in general. Cloud and Edge computing have emerged as the …

Secure medical image steganography method based on pixels variance value and eight neighbors

MK Abed, MM Kareem, RK Ibrahim… - 2021 International …, 2021 - ieeexplore.ieee.org
The security aspect of processes and methodologies in the information and communication
technology era is the main part. The security of information should a key priority in the secret …

[PDF][PDF] A secure image steganography using LSB and double XOR operations

A Ahmed, A Ahmed - … Journal of Computer Science and Network …, 2020 - researchgate.net
Summary Least Significant Bit (LSB) is a common and popular technique for steganographic
images, especially when the spatial domain of an image is considered. Because of its high …

A pixel contrast based medical image steganography to ensure and secure patient data

MM Hashim, AA Mahmood… - International Journal of …, 2021 - ijnaa.semnan.ac.ir
The information and communications technology time are essential for the security aspect of
processes and methodologies. The security of information should a key priority in the secret …

[PDF][PDF] Information hiding: a tools for securing biometric information

MS Taha, MSM Rahim, MM Hashim… - Technology Reports of …, 2020 - academia.edu
The recognition of human beings via the utilization of biometric characteristics is currently
the latest innovative trend. Previous years have witnessed great interest in biometric …

A Steganography Embedding Method Based on Psingle / Pdouble and Huffman Coding

MS Taha, MH Mahdi, HN Khalid… - 2021 3rd …, 2021 - ieeexplore.ieee.org
The highest priority in the era of information and communication technology is to effectively
and accurately hide information when considering steganography. The development of such …

[HTML][HTML] Optimized steganography techniques based on PVDS and genetic algorithm

A Fahim, Y Raslan - Alexandria Engineering Journal, 2023 - Elsevier
Due to the rapid development of confidential digital communication over international
networks, security is the most significant factor. Steganography is the science of concealed …

[PDF][PDF] Power minimization of WBSN using adaptive routing protocol

ASH Altamimi, ORK Al-Dulaimi… - Indonesian Journal of …, 2020 - researchgate.net
The present work was an attempt to address a challenge of energy utilization or
consumption in WBSN, it used a proposed routing algorithm based on ant optimization …

A Coverless video steganography: A Survey

MA Kadhim, MJ Jawad - 2022 5th International Conference on …, 2022 - ieeexplore.ieee.org
In the traditional methods of information hiding, confidential information is embedded in the
carriers by modifying carriers' parameter characteristics, that will certainly leave traces of …

Identify the Presence of Hidden Information Based on Lower Coefficients Value of 2DHWT Sub-bands

SM Hashim, DA Alzubaydi - 2021 7th International Engineering …, 2021 - ieeexplore.ieee.org
This paper introduces an approach which can be discriminated between normal images and
images containing hidden information. After applying one scale 2D Haar Wavelet Transform …