A multi-layered data encryption and decryption scheme based on genetic algorithm and residual numbers

EY Baagyere, PAN Agbedemnab, Z Qin… - IEEE …, 2020 - ieeexplore.ieee.org
Over the years, Steganography and Cryptography have been complementary techniques for
enforcing security of digital data. The need for the development of robust multi-layered …

[PDF][PDF] Elliptic Curve Cryptography Performance Evaluation for Securing Multi-Factor Systems in a Cloud Computing Environment

GO Ogunleye, SE Akinsanya - Iraqi Journal of Science, 2022 - iasj.net
In the contemporary world, the security of data and privacy policies are major concerns in
cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be …

Overlapping complexes detection within protein interaction networks using improved genetic algorithm

DA Abduljabbar - Human Gene, 2024 - Elsevier
Background The protein complexes detection has an important role in analyzing biological
processes and understanding life at the cellular level. Although many complex detection …

[PDF][PDF] Linear Feedback Shift Registers-Based Randomization for Image Steganography

MA Hussein, S Al-Momen - Iraqi Journal of Science, 2023 - iasj.net
Steganography involves concealing information by embedding data within cover media and
it can be categorized into two main domains: spatial and frequency. This paper presents two …

Using steganography techniques for implicit authentication to enhance sensitive data hiding

RN Kadhum, NHM Ali - International Journal of Nonlinear …, 2022 - ijnaa.semnan.ac.ir
Smartphones recently become indispensable to users due to the services provided, like
Internet access and important applications (eg, financial and health applications). which …

Information Hiding for Text Files by Adopting the Genetic Algorithm and DNA Coding

AH Saleh, AS Yousif… - 2020 IEEE 10th …, 2020 - ieeexplore.ieee.org
Hiding information is a process to hide data or include it in different digital media such as
image, audio, video, and text. However, there are many techniques to achieve the process of …

[PDF][PDF] A coloured image watermarking based on genetic k-means clustering methodology

ZF Hassan, F Al-Shareefi, HQ Gheni - Journal of Advances in Information …, 2023 - jait.us
There are two techniques long-established in image watermarking area, namely the k-
means and genetic algorithms. The first one is commonly used to allocate an image's pixels …

Data hiding using integer lifting wavelet transform and DNA computing

FA Abdullatif, AA Abdullatif, NA Taha - Periodicals of Engineering …, 2020 - pen.ius.edu.ba
DNA computing widely used in encryption or hiding the data. Many researchers have
proposed many developments of encryption and hiding algorithms based on DNA sequence …

[PDF][PDF] TEXT STEGANOGRAPHY BASED ON ARABIC CHARACTERS LINGUISTIC FEATURES AND WORD SHIFTING METHOD

OF RASHID, MA SUBHI, MK HUSEEIN… - Journal of Engineering …, 2024 - researchgate.net
In the field of data security, the critical challenge of preserving sensitive information during
its transmission through public channels takes centre stage. Steganography, a method …

[PDF][PDF] Video steganography for image and text using deep genetic algorithm and LSB

NM Selim, SK Guirguis, YF Hassan - International Journal of …, 2022 - ijns.jalaxy.com.tw
Data security is a threat for delivering data through the internet, and it is concerned with
protecting sensitive data from unauthorized access. The security threats increase with the …