As with the growth of information on the cloud, cloud security is seen as more essential than before. Presently, millions of users are utilizing the cloud. The security of cloud computing is …
S Pramanik, SS Raja - Advances in Mathematics …, 2020 - research-publication.com
According to the optimization techniques examined in the past, the performance of Genetic Algorithm (GA) based approaches are seen as a substandard technique compared to PSO …
DM Abdullah, SY Ameen, N Omar… - Asian Journal of …, 2021 - researchgate.net
Whether it's for work or personal well-being, keeping secrets or private information has become part of our everyday existence. Therefore, several researchers acquire an entire …
D Mehta, D Bhatti - Multimedia Tools and Applications, 2022 - Springer
Digital image steganography is now one of the effective methods for exchanging confidential information over the public network. One of the major challenges is to protect secret data …
M Kumar, S Kumar, H Nagar - International Journal of Advanced …, 2020 - researchgate.net
Today, the world is going to be digitized anyway. Each business unit, each government and private sector, each research unit uses the digital image as a transfer mode for all critical …
B Gope, S Nawale, S Deo, T Chavan… - 2023 8th …, 2023 - ieeexplore.ieee.org
Secure communication has become increasingly important with the rise of online communication and data privacy concerns. Image steganography is a popular method for …
ALD Qusai, TA AL-Assadi - 2023 6th International Conference …, 2023 - ieeexplore.ieee.org
In this paper, the author has suggested a steganography technique that exploits pixels topology with a pre-determined embedding threshold that uses RGB (Red, Green, Blue) …
M Alazab, T Pham - Authorea Preprints, 2023 - techrxiv.org
Malware distribution to the victim network is commonly performed through file attachments in phishing email or downloading illegitimate files from the internet, when the victim interacts …
KD Michelle, OG Gilibrays… - Journal of Independent …, 2024 - jisrc.szabist.edu.pk
Text teganography is a method used to hide confidential messages in a message's text without arousing suspicion. This technique has been used in the past, from ancient Greece's …