Highly secured hybrid image steganography with an improved key generation and exchange for one-time-pad encryption method

M Takaoğlu, A Özyavaş, N Ajlouni… - … Üniversitesi Fen Ve …, 2023 - dergipark.org.tr
Steganography is a subject of study that has been used to hide information throughout
history. In cryptology science, the information to be hidden is encrypted. Both study subjects …

Lsb-based random embedding image steganography technique using modified collatz conjecture

AD Molato, FB Calanda, AM Sison… - 2022 7th International …, 2022 - ieeexplore.ieee.org
With digital communication breakthroughs, reliable data security and secure sharing of
secret information remain a challenge. LSB is considered one of the most used techniques …

A Comparative Analysis of LSB & DCT Based Steganographic Techniques: Confidentiality, Contemporary State, and Future Challenges

K Upreti, A Verma, J Parashar, P Vats… - 2023 6th International …, 2023 - ieeexplore.ieee.org
In order to maintain anonymity and security, the steganography is the technique of cloaking
confidential data within what seems like harmless digital material. Several steganographic …

The Revolutionary Potential of Blockchain using Smart Contracts: Unlocking the Next Generation of Technology

AP Singh, D Jain, P Vats, A Tiwari… - 2023 5th International …, 2023 - ieeexplore.ieee.org
Blockchain is a technology that uses decentralized network of nodes (miners), blockchain
consists of blocks. Each block has three parts data, hash, hash of previous block. Once data …

[PDF][PDF] Afyon Kocatepe Üniversitesi Fen ve Mühendislik Bilimleri Dergisi

M TAKAOĞLU, A ÖZYAVAŞ, N AJLOUNİ… - researchgate.net
Öz Steganografi, tarih boyunca bilgileri gizlemek için kullanılan bir çalışma konusudur.
Kriptoloji biliminde gizlenecek bilgiler şifrelenir. Her iki çalışma konusu da bilgi güvenliği ve …

[PDF][PDF] SECURE TEXT IN IMAGE STEGANOGRAPHY USING PIXEL-BASED ALGORITHM

MAA Khader, S Kavileswarapu, R Sarkar, S Ganapathy - ijeast.com
The art of encrypting a hidden message within a public message is known as
steganography. Traditionally methods like LSB (least significant bit) modification, the five …

[PDF][PDF] Towards Securing Electronic Health Records using Ceasar And Affine Cryptographic Techniques

KR Olayinka, S Wilson - 2022 - researchgate.net
The introduction of cryptography has brought plenty of improvement to health informatics,
but not really employed in health institutes and this is often as results of the protection issues …