Digital image security based on the hybrid model of image hiding and encryption

H Arora, GK Soni, RK Kushwaha… - 2021 6th International …, 2021 - ieeexplore.ieee.org
In today's world's internet is a major communication method to communicate from one end to
other, and image is mostly used digital content which are distributed on the internet but …

A survey on AWS cloud computing security challenges & solutions

S Mishra, M Kumar, N Singh… - 2022 6th International …, 2022 - ieeexplore.ieee.org
Amazon offers a comprehensive range of IT solutions to let businesses construct their
private virtual clouds and maintain total control over their infrastructure. It is possible to use …

An advanced multi-model cloud services using load balancing algorithms

RR Dornala - 2023 5th International Conference on Inventive …, 2023 - ieeexplore.ieee.org
Cloud computing is the domain that can provide online services to people without any
hardware requirement. Cloud computing has become an emerging technology for …

Secure data communication using information hiding and encryption algorithms

S Mishra, D Singh, D Pant… - 2022 Second international …, 2022 - ieeexplore.ieee.org
In today's innovation, for the information trade, the Internet is the best known and most
important medium. With the advancement of the web and data innovation, computerized …

Facial and Emotional Identification using Artificial Intelligence

H Arora, M Kumar, T Rasool… - 2022 6th International …, 2022 - ieeexplore.ieee.org
Facial identification has been an easy task for humans for a very long interval of time but
facial expressions with emotions are quite challenging nowadays. With the great success of …

Big data and ML: Interaction & Challenges

P Sen, R Jain, V Bhatnagar… - 2022 6th International …, 2022 - ieeexplore.ieee.org
A broad variety of applications are making use of machine learning (ML). In recent years, it's
been pushed to the forefront because of the advertising of big data. In the face of massive …

Weather station using raspberry pi

V Mathur, Y Saini, V Giri, V Choudhary… - … on Image Information …, 2021 - ieeexplore.ieee.org
Weather is the everyday climate that is hard to predict and impacts human activities and is
important in many different sectors. However, it is expensive and huge, bringing pain to …

Comparative analysis of image security using DCT, LSB and XOR techniques

A Agarwal, H Arora, M Mehra… - 2021 Second international …, 2021 - ieeexplore.ieee.org
In current technology, the majority of data is transferred over the internet, and the most useful
data type is image. As a result, image security is necessary for safe transmission. Image …

Enhanced Security of Digital Picture and Text Information with Hybride Model of Hiding and Encryption Techniques

H Arora, PK Sharma, K Mitanshi… - … Computing and Data …, 2022 - ieeexplore.ieee.org
In current development, for the exchanging of data, web is most notable and critical way.
With movement of web and information development, electronic media has become maybe …

Image Security Utilizing Hybrid Model of Steganography and Asymmetric Cryptography Methods

H Arora, R Agarwal, P Sharma… - … on Intelligent Data …, 2023 - ieeexplore.ieee.org
With the recent technologies, digital data is mostly used in every communication and data
transferring process. Moreover, digital images are highly preferred by people nowadays. In …