The quantum internet: A synergy of quantum information technologies and 6G networks

GG Rozenman, NK Kundu, R Liu… - IET Quantum …, 2023 - Wiley Online Library
The quantum internet is a cutting‐edge paradigm that uses the unique characteristics of
quantum technology to radically alter communication networks. This new network type is …

Encryption and steganography-based text extraction in IoT using the EWCTS optimizer

B Kumar Pandey, D Pandey, VK Nassa… - The Imaging Science …, 2021 - Taylor & Francis
This paper develops an effective encryption and steganography-based text extraction in IoT
using deep learning method. Initially, the input text and cover images are separately pre …

A survey of recent advances in image steganography

A Kumar, R Rani, S Singh - Security and Privacy, 2023 - Wiley Online Library
Over the course of technological development, data security while transmission and storing
has always been a field of continuous advancements and key importance. In the recent …

Least Significant Bit Steganography for Text and Image hiding

S Sakshi, S Verma, P Chaturvedi… - 2022 3rd International …, 2022 - ieeexplore.ieee.org
Digital image attestation is powerful regard for the digital rebellion. To fulfill this need,
different watermarking methods have been established. Though, it is hard to accomplish a …

An effective and enhanced RSA based public key encryption scheme (XRSA)

R Imam, F Anwer, M Nadeem - International Journal of Information …, 2022 - Springer
Cryptography is the mechanism of providing significant security services such as
confidentiality, authentication, and integrity. These services are essentially more important in …

A comprehensive study of digital image steganographic techniques

S Rahman, J Uddin, M Zakarya, H Hussain… - IEEE …, 2023 - ieeexplore.ieee.org
Steganography surpasses other mechanisms of securing data from potential threats. The
modern digital arena calls for robust information hiding techniques and, thus, it has always …

[PDF][PDF] Hybrid information security system via combination of compression, cryptography, and image steganography

WA Awadh, AS Alasady… - International Journal of …, 2022 - faculty.uobasrah.edu.iq
Today, the world is experiencing a new paradigm characterized by dynamism and rapid
change due to revolutions that have gone through information and digital communication …

Chaos based encryption technique for compressed h264/avc videos

MA El-Mowafy, SM Gharghory, MA Abo-Elsoud… - IEEE …, 2022 - ieeexplore.ieee.org
Saving videos streaming from the unlawful users became an urgent claim. Cryptography
and Steganography are the most important and indispensable processes to protect and …

Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism

MA Al Sibahee, ZA Abduljabbar, C Luo, J Zhang… - Plos one, 2024 - journals.plos.org
This study presents a lightweight, secure audio steganography system for hiding text
messages for transmission over the Internet, with the aim of addressing the current problems …

[PDF][PDF] Medical image compression and encryption using adaptive arithmetic coding, quantization technique and RSA in DWT domain

NH Hussein, MA Ali - Iraqi Journal of Science, 2022 - iasj.net
Currently, medical images represent basis of clinical diagnosis and source of telehealth and
teleconsultation processes. Exchange of these images can be subject to several challenges …