[HTML][HTML] Cryptographic Grade Chaotic Random Number Generator Based on Tent-Map

A Al-Daraiseh, Y Sanjalawe, S Al-E'mari… - Journal of Sensor and …, 2023 - mdpi.com
In recent years, there has been an increasing interest in employing chaotic-based random
number generators for cryptographic purposes. However, many of these generators produce …

Investigating the Effectiveness of Artificial Intelligence in Watermarking and Steganography for Digital Media Security

SMJ Abdalwahid, WA Hashim… - … Multi-Conference on …, 2024 - ieeexplore.ieee.org
Watermarking and Steganography are methods of embedding digital information within
images or other media, such as text or audio, for the purpose of Copyright Protection or …

Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication

Z Ashraf, A Sohail, M Yousaf - The Journal of Supercomputing, 2023 - Springer
Over the last decade, millions of 4G and 5G-enabled mobile devices have become part of
the Internet. Almost, all the applications have been shifted to smartphones. A person …

[HTML][HTML] An adaptive steganography insertion technique based on wavelet transform

T Alobaidi, W Mikhael - Journal of Engineering and Applied Science, 2023 - Springer
Over the past few decades, there have been several successful methods developed for
steganography. One popular technique is the insertion method, which is favored for its …

A convex selective segmentation model based on a piece-wise constant metric-guided edge detector function

MS Khan, H Ali, M Zakarya, S Tirunagari, AA Khan… - Soft Computing, 2023 - Springer
The challenge of segmentation for noisy images, especially those that have light in their
backgrounds, still exists in many advanced state-of-the-art segmentation models …

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

R Ch, V Yadlapalli, SS Sk, GT Reddy… - CAAI Transactions on …, 2024 - Wiley Online Library
Data is the key element that runs the modern society. Large amounts of data are being
released day by day as a result of many activities. The digital data is transferred through the …

[PDF][PDF] An image steganography using improved hyper-chaotic Henon map and fractal tromino

S Nagarajegowda, K Krishnan - International Journal of Electrical …, 2023 - academia.edu
Steganography is a vital security approach that hides any secret content within ordinary
data, such as multimedia. First, the cover image is converted into a wavelet environment …

DNA Steganography: Embedding the Secret Messages Using Glass Stack Method and Detecting Errors Made by Different Attacks

M Nahar, AHM Kamal - International Journal of Computers and …, 2024 - Taylor & Francis
Cyber threats pose a significant challenge to protecting cloud-based health data, including
DNA sequences and patient information. Steganography is a well-known solution to this …

Boosting Digital Safeguards: Blending Cryptography and Steganography

A Maiti, S Laha, R Upadhaya, S Biswas… - arXiv preprint arXiv …, 2024 - arxiv.org
In today's digital age, the internet is essential for communication and the sharing of
information, creating a critical need for sophisticated data security measures to prevent …

[PDF][PDF] A comparative study of steganography using watermarking and modifications pixels versus least significant bit

H Caballero, V Muñoz… - International Journal of …, 2023 - academia.edu
This article presents a steganography proposal based on embedding data expressed in
base 10 by directly replacing the pixel values from images red, green blue (RGB) with a …