Image encryption based on 2DNA encoding and chaotic 2D logistic map

AH Alrubaie, MAA Khodher, AT Abdulameer - Journal of Engineering and …, 2023 - Springer
DNA has recently been investigated as a possible medium concerning ultra-compact
information storage and ultra-scale computation. The development of secure image …

[PDF][PDF] Evaluation of rijndael algorithm for audio encryption by brute force attack

SG Mohammed, NS Al-Mothafar - Journal of Engineering, 2024 - iasj.net
The use of information transfer is a major reason for the spread of information piracy,
especially digital information that includes audio or other information, to preserve data …

[PDF][PDF] Linear Feedback Shift Registers-Based Randomization for Image Steganography

MA Hussein, S Al-Momen - Iraqi Journal of Science, 2023 - iasj.net
Steganography involves concealing information by embedding data within cover media and
it can be categorized into two main domains: spatial and frequency. This paper presents two …

[PDF][PDF] Innovative Progress in Phased-Array Antenna Systems for Ultra-Low Latency and High-Speed Communication Networks for Resilient Infrastructure.

MM Abdulrahman, MS Jabbar… - Mathematical …, 2024 - researchgate.net
This paper delves into the recent advancements in phased-array antenna systems, focusing
on their application in low earth orbit (LEO) satellite systems and their implications for high …

Implementation of novel cryptographic technique for enhancing the cipher security for Resilient Infrastructure.

FK Jabor, B Al-Attar… - Fusion: Practice & …, 2024 - search.ebscohost.com
Cryptography is a well-known technology for providing confidential data transfer via
asymmetric or symmetric algorithms with public or private keys. Secure data transmission …

Video Steganography based on Sine Chaotic Map and Hamming Code

MM Naji, AT Abdulsadda, SM Wadi - AUIQ Technical Engineering …, 2024 - ates.alayen.edu.iq
With the increase in internet usage, data exchange happens at a higher pace, but with this
comes the risk of security breaches. Hackers often target data exchange, making security a …

Image and Video Steganography using Deep Learning.

P Agwan, R Satpure, H Mehta… - … of Engineering & …, 2024 - search.ebscohost.com
This project proposes a deep learning-based steganography system that is used to both
hide and reveal images and videos. To enhance security, deep learning is utilized for …