Secure 2d image steganography using recamán's sequence

S Farrag, W Alexan - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
This paper presents a double-layer secure message scheme. The first layer is of a
cryptographic nature, where the Data Encryption Standard (DES), CAST5 or Blowfish is …

Implementation of cryptography in steganography for enhanced security

H Antonio, PWC Prasad, A Alsadoon - Multimedia Tools and Applications, 2019 - Springer
The rapid development in technology has had a great influence on the exchange of
information. In this modern era, maintaining security during informationexchanges is …

Internet of things (iot) applications, tools and security techniques

R Kawatra, DK Dharamdasani, R Ajmera… - 2022 2nd …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) has transformed cultural traditions into high-tech ones. Urban
areas, smart industries, smart devices, environmental management, smart transportation …

Coupled double consensus multi-graph fusion for multi-view clustering

T Wu, GF Lu - Information Sciences, 2024 - Elsevier
Multi-view graph clustering (MVGC) is a technique that combines information from multiple
views to perform clustering analysis on graph data. However, the consensus information …

Privacy Protection and Utility Trade-Off for Social Graph Embedding

L Cai, J Tang, S Dang, G Chen - Information Sciences, 2024 - Elsevier
In graph embedding protection, deleting the embedding vector of a node does not
completely disrupt its structural relationships. The embedding model must be retrained over …

[PDF][PDF] A NOVEL IMAGE STEGANOGRAPHIC SYSTEM BASED ON EXACT MATCHING ALGORITHM AND KEY-DEPENDENT DATA TECHNIQUE.

MA Alsarayreh, MA Alia, KA Maria - Journal of Theoretical & Applied …, 2017 - jatit.org
Steganography is defined as the art of hiding secret information. It is used to guarantee
information accessibility only by authorized parties. The least-significant bit (LSB) approach …

[PDF][PDF] Improved steganography scheme based on fractal set.

MA Alia, K Suwais - Int. Arab J. Inf. Technol., 2020 - ccis2k.org
Steganography is the art of hiding secret data inside digital multimedia such as image,
audio, text and video. It plays a significant role in current trends for providing secure …

Image steganography based on LSB matching and image enlargement

NM Al-Aidroos, HA Bahamish - 2019 First International …, 2019 - ieeexplore.ieee.org
Steganography plays a main role in data security field. It aims to cover important data within
a cover medium such that the data existence remains confidential. The secret data is hidden …

[PDF][PDF] A Combined approach of steganography and cryptography technique based on parity checker and huffman encoding

AA Abdelmged, AHS Saad… - International Journal of …, 2016 - researchgate.net
Steganography and Cryptography are two popular ways of sending vital and pivotal
information in a secret way. But neither cryptography nor steganography alone can …

Evaluation of using steganography technique to hide a text in grayscale digital images

SO Alsharkasi, MM Elsheh, FO Ehtiba - مجلة البحوث الأكاديمية, 2021‎ - lam-journal.ly
this paper presents a new approach to hide sensitive data inside grayscale digital image. It
makes use of combining the RSA encryption algorithm with steganography technique. This …