A novel image steganography technique based on quantum substitution boxes

AA Abd EL-Latif, B Abd-El-Atty… - Optics & Laser …, 2019 - Elsevier
Substitution boxes play an essential role in designing secure cryptosystems. With the
evolution of quantum technologies, current data security mechanisms may be broken due to …

A comprehensive review about image encryption methods

C Tiken, R Samlı - Harran Üniversitesi Mühendislik Dergisi, 2022 - dergipark.org.tr
In today's technology world, data security has a great importance. Because each data type
has its own characteristics, there are various methods of providing this security. The main …

[PDF][PDF] Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats

MM Hashim, MSM Rahim, FA Johi… - … of Engineering & …, 2018 - researchgate.net
Recently, Steganography is an outstanding research area which used for data protection
from unauthorized access. Steganography is defined as the art and science of covert …

Triple-layer image security using a zigzag embedding pattern

S Farrag, W Alexan, HH Hussein - … International Conference on …, 2019 - ieeexplore.ieee.org
This paper proposes a triple-layer, high capacity, message security scheme. The first two
layers are of a cryptographic nature, whereas the third layer is of a steganographic nature. In …

An imperceptible LSB image hiding on edge region using DES encryption

EJ Kusuma, OR Indriani, CA Sari… - … on Innovative and …, 2017 - ieeexplore.ieee.org
Sending image in a plain form has a high risk for the data being vulnerable to steal. Thus,
due to reducing the risk, data security techniques should be implemented. Data security …

Digital image signature using triple protection cryptosystem (RSA, Vigenere, and MD5)

RD Ardy, OR Indriani, CA Sari… - … Conference on Smart …, 2017 - ieeexplore.ieee.org
Authentication of digital media has been done with the various scheme, one of them is a
digital signature. The main reason the technique of digital signature appears on the …

A good performance OTP encryption image based on DCT-DWT steganography

WS Sari, EH Rachmawanto… - … Electronics and Control), 2017 - telkomnika.uad.ac.id
The security aspect is very important in data transmission. One way to secure data is with
steganography and cryptography. Surely research on this should continue to be developed …

Hybrid method using HWT-DCT for image watermarking

A Susanto, CA Sari… - 2017 5th International …, 2017 - ieeexplore.ieee.org
This paper proposed a hybrid method that had been solved both of these issues. We
proposed a combination of Discrete Cosine Transform (DCT) and Haar Wavelet Transform …

QR code based color image stego-crypto technique using dynamic bit replacement and logistic map

P Mathivanan - Optik, 2021 - Elsevier
This paper uses a novel color image stego-crypto technique to enhance the capacity,
security and robustness of data embedding process. The proposed scheme uses a base64 …

A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size

EH Rachmawanto, CA Sari - 2017 International Seminar on …, 2017 - ieeexplore.ieee.org
Many people have used the internet in daily communication. The rise of internet data theft
makes the security of data transmission becomes very important. Cryptography and …