A new fuzzy-DNA image encryption and steganography technique

SE El-Khamy, NO Korany, AG Mohamed - IEEE Access, 2020 - ieeexplore.ieee.org
Image encryption and steganography techniques are receiving a lot of interest and
investigations due to their high importance in multimedia communication systems. A novel …

A novel steganography technique for digital images using the least significant bit substitution method

S Rahman, J Uddin, HU Khan, H Hussain… - IEEE …, 2022 - ieeexplore.ieee.org
Communication has become a lot easier in this era of technology, development of high-
speed computer networks, and the inexpensive uses of Internet. Therefore, data …

Hiding text using the least significant bit technique to improve cover image in the steganography system

EHJ Halboos, AM Albakry - Bulletin of Electrical Engineering and …, 2022 - beei.org
One of the highest priorities in the era of information technology is to achieve an accurate
and effective system for hiding security data. One of the goals of steganography is …

A systematic review of non-functional requirements mapping into architectural styles

M Nouman, M Azam, AM Saleh, A Alsaeedi… - Bulletin of Electrical …, 2023 - beei.org
Fortunately, the software attracted enough businesses to the market, allowing them to earn
money in less time with less work and more accurate results. Software development life …

Method for Detecting Steganographic Changes in Images Using Machine Learning

D Denysiuk, O Savenko, S Lysenko… - 2023 13th …, 2023 - ieeexplore.ieee.org
This article presents a method for detecting steganographic changes in images using
convolutional neural networks. The use of convolutional neural networks made it possible to …

[PDF][PDF] A secure image encryption and embedding approach using MRSA and RC6 with DCT transformation

M Ganavi, S Prabhudeva, SN Nayak - International Journal of …, 2022 - academia.edu
The growing potentialities of recent communications necessitate information security on the
computer network. The various fields such as banking, E-commerce, education, and health …

Performance analysis of LSB color image steganography based on embedding pattern of the rgb channels

B Sugiarto, CA Sari, IMS De Rosal… - … on Application for …, 2020 - ieeexplore.ieee.org
This research aims to analyze three patterns of embedding messages based on the Least
Significant Bit (LSB) method on RGB color images. Previous research has suggested a …

A systematic review of blockchain technology in current epoch: applications, adoption challenges, and opportunities

M Nouman, M Azam, AR Gill - 2022 - preprints.org
Blockchain innovation stands out enough to be noticed and adopted in various countries
and organizations around the world. Many businesses, including finance, medical services …

K-en az anlamlı bitlere dayalı kaotik bir harita kullanan renkli görüntü steganografisi

H Çelik, N Doğan - Politeknik Dergisi, 2021 - dergipark.org.tr
Günümüzde dijital iletişim içerisinde bilginin güvenliği çok önemli bir yer tutmaktadır. Uçtan
uca iletişimlerde önemli bilgilerin şifrelenmesi veya bir taşıyıcı üzerine gömülerek …

Steganografi Gambar Menggunakan Metode Least Significant Bit Pada Citra Dengan Operasi XOR

M Adha, F Yanto, L Handayani… - Building of Informatics …, 2024 - ejurnal.seminar-id.com
Abstrak− Salah satu cara mengamankan pesan rahasia dari pihak-pihak lain yang tidak
berkepentingan adalah steganografi. Salah satu metode yang paling banyak digunakan …