Iomt security: Sha3-512, aes-256, rsa and lsb steganography

W Alexan, A Ashraf, E Mamdouh… - … on Information and …, 2021 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) has been witnessing huge leaps in its development
due to the advancements of neighboring technologies. Those include 5G, big data and …

Stegocrypt: A robust tri‐stage spatial steganography algorithm using TLM encryption and DNA coding for securing digital images

W Alexan, E Mamdouh, A Aboshousha… - IET Image …, 2024 - Wiley Online Library
This research work presents a novel secured spatial steganography algorithm consisting of
three stages. In the first stage, a secret message is divided into three parts, each is …

A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image

S Rahman, J Uddin, H Hussain, A Ahmed, AA Khan… - Scientific Reports, 2023 - nature.com
In the recent couple of years, due to the accelerated popularity of the internet, various
organizations such as government offices, military, private companies, etc. use different …

A novel and efficient digital image steganography technique using least significant bit substitution

S Rahman, J Uddin, H Hussain, S Shah, A Salam… - Scientific Reports, 2025 - nature.com
Steganography is used to hide sensitive types of data including images, audio, text, and
videos in an invisible way so that no one can detect it. Image-based steganography is a …

Securing sensitive data through corner filters, chaotic maps and lsb embedding

W Alexan, E Mamdouh, A Elkhateeb… - 2021 3rd Novel …, 2021 - ieeexplore.ieee.org
This paper proposes 2 multiple layer message security schemes. Information security is
carried out through the implementation of cryptography, steganography and image …

Social engineering and technical security fusion

W Alexan, E Mamdouh, M ElBeltagy… - 2022 International …, 2022 - ieeexplore.ieee.org
Ensuring the secure transmission of sensitive messages over unsecured networks has been
a staggering problem in the face of scientists and engineers in recent times. This is …

A comparative analysis of audio steganography methods and tools

PM Reyers - 2023 - essay.utwente.nl
Steganography is the process of hiding data within other data. Unlike cryptography which
aims to secure data through obscuring its meaning, steganography aims to secure data by …

[PDF][PDF] Digital Rights Management and LSB Embedding Using Stella Octangula Number Sequence

A Alaa - 2023 - researchgate.net
Every day, millions of messages and bits of data are sent. Some of this information is private,
Some people and businesses would spend millions of dollars to protect their data from …

IDENTIFYING OPTIMAL MESSAGE EMBEDDING LOCATION IN AUDIO STEGANOGRAPHY USING GENERATIVE ADVERSARIAL NETWORKS.

M Hajer, M Anbar - Eastern-European Journal of Enterprise …, 2022 - search.ebscohost.com
Audio steganography (AS) uses the auditory redundancy of the human ear to conceal the
hidden message inside the audio track. In recent studies, deep learning-based steganalysis …

[PDF][PDF] Watermarking audio files with copyrights

F Aboelezz - 2022 - researchgate.net
The internet is a host for billions of pirated audio files, including songs, audio books,
podcasts, and voice recordings. People who illegally upload audio files on the internet …