W Alexan, H Medhat, A Hamza… - 2018 Advances in …, 2018 - ieeexplore.ieee.org
This paper proposes two different implementations of a double-layer message security scheme. In both schemes, the first layer is of a cryptographic nature, employing the AES …
R Hussein, W Alexan - 2019 2nd International Conference on …, 2019 - ieeexplore.ieee.org
Since the rise of the Internet, information security has been one of the most important factors in networking. Cryptography and steganography are the arts and sciences of secret …
MK Harahap, N Khairina - Journal of Information Systems …, 2020 - e-journal.unair.ac.id
Background: The confidentiality of a message may at times be compromised. Steganography can hide such a message in certain media. Steganographic media such as …
M Fuad, F Ernawan - Bulletin of Electrical Engineering and Informatics, 2020 - beei.org
Steganography is a technique of concealing the message in multimedia data. Multimedia data, such as videos are often compressed to reduce the storage for limited bandwidth. The …
We introduce the notion of an application-based covert channel—or ABCC—which provides a formal syntax for describing covert channels that tunnel messages through existing …
S Prasad, AK Pal - Emerging Technologies in Data Mining and Information …, 2019 - Springer
In recent, the confidentiality of important data is indispensable for Internet users. Although both the encryption and steganography schemes are well suited to protect the confidentiality …
S SP - Computational Intelligence, 2020 - search.ebscohost.com
The rapid growth of the internet and the internet of things (IoT) refers to the next phase of information revolution whose context involves billions of smart devices and sensors …
A Harika, S Anamalamudi, S Humayra… - 2021 13th …, 2021 - ieeexplore.ieee.org
The goal of steganography is to hide the data in another medium, meaning disguising the data, so that the existence of the messages can be concealed. Steganography can be …
Data hiding or information hiding is a prominent class of information security that aims at reliably conveying secret data embedded in a cover object over a covert channel. Digital …