A lightweight hybrid scheme for hiding text messages in colour images using LSB, Lah transform and Chaotic techniques

IQ Abduljaleel, ZA Abduljabbar, MA Al Sibahee… - Journal of Sensor and …, 2022 - mdpi.com
Data security can involve embedding hidden images, text, audio, or video files within other
media to prevent hackers from stealing encrypted data. Existing mechanisms suffer from a …

Audio steganography with enhanced LSB method for securing encrypted text with bit cycling

EW Abood, AM Abdullah, MA Al Sibahe… - Bulletin of Electrical …, 2022 - beei.org
Data security pressing issue, particularly in terms of ensuring secure and reliable data
transfer over a network. Encryption and seganography play a fundamental role in the task of …

[HTML][HTML] Authentication, Access Control and Scalability models in Internet of Things Security-A Review

M Kokila, S Reddy - Cyber Security and Applications, 2024 - Elsevier
Abstract The Internet of Things (IoT) leads to the next phase of human interaction with
technology. With the help of the IoT, physical objects can be given the ability to generate …

Fusion of blockchain, IoT and artificial intelligence-A survey

S Koppu, SRK Somayaji… - … on Information and …, 2022 - search.ieice.org
Blockchain is one of the prominent rapidly used technology in the last decade in various
applications. In recent years, many researchers explored the capabilities of blockchain in …

[HTML][HTML] High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem

G Jayabalasamy, S Koppu - Journal of King Saud University-Computer and …, 2022 - Elsevier
Abstract “Blockchain” is a buzzword that has captured attention from researchers in almost
every possible domain. In a blockchain ecosystem, multiple parties across the network have …

A Symmetric Key and Elliptic Curve Cryptography-Based Protocol for Message Encryption in Unmanned Aerial Vehicles

VO Nyangaresi, HM Jasim, KAA Mutlaq… - Electronics, 2023 - mdpi.com
Unmanned aerial vehicles have found applications in fields such as environmental
monitoring and the military. Although the collected data in some of these application …

Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications

GK Ragesh, A Kumar - The Journal of Supercomputing, 2023 - Springer
Abstract Internet of Things (IoT) has a wide concentration in today's technological world. It
has a significant impact on smart infrastructure with a security vision. So, IoT devices with …

Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism

MA Al Sibahee, ZA Abduljabbar, C Luo, J Zhang… - Plos one, 2024 - journals.plos.org
This study presents a lightweight, secure audio steganography system for hiding text
messages for transmission over the Internet, with the aim of addressing the current problems …

A secure mutual authentication protocol based on visual cryptography technique for IoT-Cloud

BB Ehuil, C Chen, S Wang, H Guo… - Chinese Journal of …, 2024 - ieeexplore.ieee.org
Because of the increasing number of threats in the IoT cloud, an advanced security
mechanism is needed to guard data against hacking or attacks. A user authentication …

Smart city energy efficient data privacy preservation protocol based on biometrics and fuzzy commitment scheme

VO Nyangaresi, ZA Abduljabbar, KAA Mutlaq… - Scientific Reports, 2024 - nature.com
Advancements in cloud computing, flying ad-hoc networks, wireless sensor networks,
artificial intelligence, big data, 5th generation mobile network and internet of things have led …