[HTML][HTML] Smart home security solutions using facial authentication and speaker recognition through artificial neural networks

N Saxena, D Varshney - International Journal of Cognitive Computing in …, 2021 - Elsevier
In this paper, a holistic solution for Smart Home Security is implemented which helps in
improving privacy and security using two independent and emerging technologies of facial …

A secure image steganography algorithm based on least significant bit and integer wavelet transform

E Emad, A Safey, A Refaat, Z Osama… - Journal of Systems …, 2018 - ieeexplore.ieee.org
The rapid development of data communication in modern era demands secure exchange of
information. Steganography is an established method for hiding secret data from an …

A remote attestation mechanism for the sensing layer nodes of the Internet of Things

B Gong, Y Zhang, Y Wang - Future Generation Computer Systems, 2018 - Elsevier
Trusted transmission of data in sensing layer is the basis of security of Internet of Things so
in data transmission process the trust of sensing node needs real-time confirmation and the …

A novel encryption with bacterial foraging optimization algorithm based pixel selection scheme for video steganography

MN Sharath, TM Rajesh, M Patil - Multimedia Tools and Applications, 2023 - Springer
In the digital era, security is a challenging problem due to the drastic increase in the
utilization of the Internet, personal computers, smartphones, etc. for communication …

A two-level secure data hiding algorithm for video steganography

S Manisha, TS Sharmila - Multidimensional Systems and Signal …, 2019 - Springer
Sensitive data is exchanged frequently through wired or wireless communication that are
vulnerable to unauthorized interception. Cryptography is a solution to overcome this issue …

Cyber security risks for minors: A taxonomy and a software architecture

A Tsirtsis, N Tsapatsoulis… - … on semantic and …, 2016 - ieeexplore.ieee.org
The explosion of the Internet provides a variety possibilities for communication, finding
information and many other activities, turning into an essential tool in our modern everyday …

[PDF][PDF] Image Steganography Technique Based on Integer Wavelet Transform Using Most Significant Bit Categories.

NIR Yassin, EMF El Houby - … Journal of Intelligent Engineering & Systems, 2022 - inass.org
In this paper, an image steganographic technique based on Integer Wavelet Transform
(IWT) is proposed. The cover image is transformed using IWT to suppress the secret …

A novel technique for fingerprint based secure user authentication

SS Ali, VS Baghel, II Ganapathi… - … on Emerging Topics …, 2021 - ieeexplore.ieee.org
Fingerprint biometrics are extremely popular among digital identity systems for
authentication. Most fingerprint based authentication systems store unique minutiae points …

Polynomial Vault: A secure and robust fingerprint based authentication

SS Ali, II Ganapathi, S Mahyo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Fingerprint matching is one of the extensively used tools to authenticate users. It has been
accepted by governments of various countries to authenticate their citizens. The common …

A trusted attestation scheme for data source of internet of things in smart city based on dynamic trust classification

B Gong, J Liu, S Guo - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) in smart cities collects and transmits a large amount of time–
space-sensitive information to realize feedback control. It bridges the gap between the …