A crypto-steganography scheme for IoT applications based on bit interchange and crypto-system

S Alsamaraee, AS Ali - Bulletin of Electrical Engineering and Informatics, 2022 - beei.org
Image steganography and cryptography have been used widely due to the dramatic
evolution of the internet of things (IoT) and the simplicity of capturing and transferring digital …

[PDF][PDF] Students Learning Behaviour: Factors Influencing Students Learning Behavior

FO Areche - International Journal of Language, Literature and …, 2022 - aipublications.com
The purpose of the research is to identify the relevant aspects that will have a direct impact
on students learning behaviour'perceptions of the most popular organized university. The …

Analisis Daya Tahan Keamanan Data Pada Steganografi Berbasis Teks Dalam Struktur Kalimat Bahasa Indonesia

RF Siahaan - Jurnal SAINTIKOM (Jurnal Sains …, 2023 - ojs.trigunadharma.ac.id
Keamanan data dalam steganografi berbasis teks perlu dianalisis secara mendalam untuk
memastikan keberlanjutan dan keamanan metode tersebut. Tujuan dari penelitian ini …

A Hybrid Approach Towards Image Steganography Using LSB and Shannon–Fano Encoding Technique

S Allwadhi, K Joshi, AK Yadav… - 2023 5th International …, 2023 - ieeexplore.ieee.org
Steganography is a method that may be used to conceal sensitive information within an
image or in some other multimedia. Both steganography and cryptography offer …

A Hybrid Cryptography Method using Extended Letters in Arabic and Persian Language

K Wang - … Journal of Advanced Computer Science and …, 2023 - search.proquest.com
Cryptography is widely used in information security systems. In encryption, the goal is to
hide information in such a way that only the sender and receiver are aware of the existence …

[PDF][PDF] Computational analysis of arabic cursive steganography using complex edge detection techniques

AH Ibrahim, AS Alturki - International Journal of Advanced …, 2020 - pdfs.semanticscholar.org
Arabic language contains a multiple set of features which complete the process of
embedding and extracting text from the compressed image. In specific, the Arabic language …

Computer-assisted academic methods: determining the methods of teaching to higher education students

MEC Macedo - … Journal of Advanced Engineering, Management and …, 2022 - hal.science
This work aims to investigate different teaching methodologies for university students,
although legislation mandates that students with autism receive instruction linked to the …

Student Satisfaction: Analysis of the Equity students and student satisfaction at the Higher education-Implementation of Relevant Education

MEC Macedo - … Journal of Advanced Engineering Research and …, 2022 - hal.science
This study's objective was to investigate the connections between staff perceptions of
equality and the levels of student contentment at private institutions in the Kurdistan area of …

Proposed Method for Text Steganography

AA Idress, YH Ismael - JMCER, 2024 - jmcer.org
Many people can now communicate with each other easily and at a high speed. However,
using the Internet for communication is accompanied by the problem of providing protection …

[引用][C] Analisis Daya Tahan Keamanan Data Pada Steganografi Berbasis Teks Dalam Struktur Kalimat Bahasa Indonesia

RFSSP Nusantara - unit03.trigunadharma.ac.id
Data security in text-based steganography needs to be analyzed in depth to ensure the
sustainability and security of the method. The purpose of this research is to analyze the …