A novel steganography technique for digital images using the least significant bit substitution method

S Rahman, J Uddin, HU Khan, H Hussain… - IEEE …, 2022 - ieeexplore.ieee.org
Communication has become a lot easier in this era of technology, development of high-
speed computer networks, and the inexpensive uses of Internet. Therefore, data …

[PDF][PDF] Modified Inverse LSB Method for Highly Secure Message Hiding

M Abuzalata, Z Alqadi, J Al-Azzeh… - International Journal of …, 2019 - academia.edu
The data may be very important and very confidential and when sent in an insecure
environment may be stolen or being snatched on them, which eliminates the importance and …

Security through blowfish and lsb bit–cycling with mathematical sequences

W Alexan, F Hemeida - 2019 Signal Processing: Algorithms …, 2019 - ieeexplore.ieee.org
Recently, lots of research work and papers are focusing on the combination of
steganography and cryptography. Steganography conceals the presence of a secret …

[PDF][PDF] A novel technique for data steganography

AY Hindi, MO Dwairi, ZA AlQadi - Engineering, Technology & …, 2019 - academia.edu
In this paper, a novel stego-method will be introduced, which can be used to hide any secret
message in any holding color image. The proposed method will be implemented and tested …

Data encryption & decryption using steganography

N Manohar, PV Kumar - 2020 4th international conference on …, 2020 - ieeexplore.ieee.org
Video steganography is a method that processes secure communication. When we see the
history of steganography, it was hidden in many ways such as tablets covered with wax, & …

Secured image steganography based on Catalan transform

S Mukhopadhyay, S Hossain, SK Ghosal… - Multimedia Tools and …, 2021 - Springer
Transform domain steganography methods are always preferable than spatial domain
methods to the research community due to following advantages: better feature …

[PDF][PDF] Secure key exchange against man-in-the-middle attack: Modified diffie-hellman protocol

M Kara, A Laouid, M AlShaikh… - Jurnal Ilmiah Teknik …, 2021 - researchgate.net
One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a
widely used technique on which key exchange systems around the world depend. This …

[PDF][PDF] Comparative Analysis of Color Image Encryption-Decryption Methods Based on Matrix Manipulation

RJ Rasras, M Abuzalata, Z Alqadi… - … Journal of Computer …, 2019 - researchgate.net
Color image encryption-decryption is an important issue, because it is used in many
important applications. This paper will introduce 3 methods of image encryption-decryption …

[PDF][PDF] A LSB based image steganography using random pixel and bit selection for high payload

UAME Ali, E Ali, M Sohrawordi… - International Journal of …, 2021 - researchgate.net
Security in digital communication is becoming more important as the number of systems is
connected to the internet day by day. It is necessary to protect secret message during …

Diffie-Hellman key exchange through Steganographied images

A Khaldi - Law, State and Telecommunications Review, 2018 - periodicos.unb.br
Purpose”“In a private key system, the major problem is the exchange of the key between the
two parties. Diffie and Hellman have set up a way to share the key. However, this technique …