A comparative analysis of arabic text steganography

R Thabit, NI Udzir, SM Yasin, A Asmawi, NA Roslan… - Applied Sciences, 2021 - mdpi.com
Protecting sensitive information transmitted via public channels is a significant issue faced
by governments, militaries, organizations, and individuals. Steganography protects the …

[PDF][PDF] Cryptography using random Rc4 stream cipher on SMS for android-based smartphones

R Rifki, A Septiarini, HR Hatta - IJACSA) International Journal of …, 2018 - academia.edu
Service (SMS) application have to pass the SMS Center (SMSC) to record the
communication between the sender and recipient. Therefore, the message security is not …

[PDF][PDF] Video steganography using 3D distance calculator based on YCbCr color components

EJ Baker, AA Majeed, SA Alazawi, S Kasim… - Indonesian Journal of …, 2021 - core.ac.uk
Steganography techniques have taken a major role in the development in the field of
transferring multimedia contents and communications. Therefore, field of steganography …

Ncryptr: a symmetric and asymmetric encryption application

G Ribeiro, M Grabovschi, M Antunes… - 2019 14th Iberian …, 2019 - ieeexplore.ieee.org
Each person carries digital devices that communicate with other person's devices and may
transmit sensitive data. When the transmitted data is sensitive, it becomes necessary to …

[PDF][PDF] Using Blockchain to Improve the Security Of The X3DH Key Exchange Protocol.

SJ Mousav, K Chaharsooghi, GA Montaz - International Journal of …, 2023 - ijict.itrc.ac.ir
First and most important step to making secure end-to-end encryption is key exchange.
X3DH is one of the most used protocols to do that. It uses a trusted server to exchange keys …