A survey of recent advances in image steganography

A Kumar, R Rani, S Singh - Security and Privacy, 2023 - Wiley Online Library
Over the course of technological development, data security while transmission and storing
has always been a field of continuous advancements and key importance. In the recent …

An efficient and secure technique for image steganography using a hash function

ZI Nezami, H Ali, M Asif, H Aljuaid, I Hamid… - PeerJ Computer …, 2022 - peerj.com
Steganography is a technique in which a person hides information in digital media. The
message sent by this technique is so secret that other people cannot even imagine the …

Intrusion detection on AWS cloud through hybrid deep learning algorithm

B RM, JK MK - Electronics, 2023 - mdpi.com
The network security and cloud environment have been playing vital roles in today's era due
to increased network data transmission, the cloud's elasticity, pay as you go and global …

[PDF][PDF] High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB.

CA Sari, MH Dzaki, EH Rachmawanto, RR Ali… - International Journal of …, 2023 - inass.org
The exchange of confidential information should be done in a secure environment.
Therefore, security is needed if the exchange of information is carried out using Internet …

Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats

S Rahman, J Uddin, H Hussain, S Jan, I Khan… - Sustainability, 2023 - mdpi.com
The Internet and Big Data expansion have motivated the requirement for more generous
stockpiling to hold and share information. Against the current era of information …

An innovative image encryption algorithm enhanced with the Pan-Tompkins Algorithm for optimal security

A İhsan, N Doğan - Multimedia Tools and Applications, 2024 - Springer
This study introduces a cutting-edge image encryption algorithm aimed at elevating security
standards. The Pan-Tompkins Algorithm (PTA) for key generation is proposed for the first …

[HTML][HTML] Enhanced payload volume in the least significant bits image steganography using hash function

YY Ghadi, T AlShloul, ZI Nezami, H Ali, M Asif… - PeerJ Computer …, 2023 - peerj.com
The art of message masking is called steganography. Steganography keeps communication
from being seen by any other person. In the domain of information concealment within …

Identifying Lethal Effects and Risk Level Using an Improved Classification Technique

V Deepak, P Srividdhya, M Muthumari… - 2021 Third …, 2021 - ieeexplore.ieee.org
Diabetes is one in all the foremost lethal diseases within the world. Diabetes is categorized
into two types; they are Type 1 and Type 2. Type 1 diabetes usually occurs in adolescence …

[PDF][PDF] Multistage Encryption for Text Using Steganography and Cryptography

MM Msallam, F Aldoghan - Journal of Techniques, 2023 - iasj.net
One of the most crucial challenges in information and communication technology research is
to make more security for any system moving data via the internet. Where system security is …

Analysis and Design of Self-service Local Water Company (LWC) using Vernam Cipher Cryptography Algorithm

RM Irodah, A Adriansyah - 2022 2nd International Conference …, 2022 - ieeexplore.ieee.org
The main factors affecting the performance of Local Water Company (LWC) when managing
consumable water distribution in Indonesia are non-revenue water, less water usage …