Encryption and steganography-based text extraction in IoT using the EWCTS optimizer

B Kumar Pandey, D Pandey, VK Nassa… - The Imaging Science …, 2021 - Taylor & Francis
This paper develops an effective encryption and steganography-based text extraction in IoT
using deep learning method. Initially, the input text and cover images are separately pre …

New direction of cryptography: A review on text-to-image encryption algorithms based on RGB color value

A Abusukhon, S AlZu'bi - 2020 Seventh International …, 2020 - ieeexplore.ieee.org
Data encryption techniques are important for answering the question: How secure is the
Internet for sending sensitive data. Keeping data secure while they are sent through the …

[PDF][PDF] Load balancing techniques in cloud computing: Extensive review

AAA Alkhatib, A Alsabbagh, R Maraqa… - Advances in science …, 2021 - researchgate.net
It has become difficult to handle traditional networks because of extensive network
developments and an increase in the number of network users, and also because of new …

Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map

J Zheng, LF Liu - IET image processing, 2020 - Wiley Online Library
The one‐dimensional (2D) chaotic encryption algorithm has good encryption performance.
For its properties, such as the excellent complexity, pseudo‐randomness, and sensitivity to …

On the security of the standardized MQV protocol and its based Evolution Protocols

Z Mohammad, V Nyangaresi… - 2021 International …, 2021 - ieeexplore.ieee.org
The MQV is an authenticated key agreement protocol which does not use any one-way hash
functions in its block design, and it is standardized in (IEEE, ANSI, and ISO). However, its …

A fast text-to-image encryption-decryption algorithm for secure network communication

NS Noor, DA Hammood, A Al-Naji, J Chahl - Computers, 2022 - mdpi.com
Data security is the science of protecting data in information technology, including
authentication, data encryption, data decryption, data recovery, and user protection. To …

g-EoN: A Non-salient Approach Towards Encryption Using Gamma Function Γ (-α β)=-β α Γ (β-α β)

AK Das, N Kar - International Conference on Advances in Cyber …, 2021 - Springer
Cryptography is the art of presenting secret information under code obfuscation. This can be
achieved by various algorithms which convert human readable text into non-legible text …

[PDF][PDF] Secure key exchange against man-in-the-middle attack: Modified diffie-hellman protocol

M Kara, A Laouid, M AlShaikh… - Jurnal Ilmiah Teknik …, 2021 - researchgate.net
One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a
widely used technique on which key exchange systems around the world depend. This …

A comprehensive review about image encryption methods

C Tiken, R Samlı - Harran Üniversitesi Mühendislik Dergisi, 2022 - dergipark.org.tr
In today's technology world, data security has a great importance. Because each data type
has its own characteristics, there are various methods of providing this security. The main …

Toward achieving a balance between the user satisfaction and the power conservation in the internet of things

A Abusukhon - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
In the recent era of digital revolution, life has become simple and more comfortable than it
was before. Today, we are witnessing a revolution in the information technology domain …