A survey on AWS cloud computing security challenges & solutions

S Mishra, M Kumar, N Singh… - 2022 6th International …, 2022 - ieeexplore.ieee.org
Amazon offers a comprehensive range of IT solutions to let businesses construct their
private virtual clouds and maintain total control over their infrastructure. It is possible to use …

Combined image encryption and steganography technique for enhanced security using multiple chaotic maps

H Aparna, J Madhumitha - Computers and Electrical Engineering, 2023 - Elsevier
This paper proposes a novel security algorithm which combines the concepts of
Cryptography and Steganography to provide enhanced security to digital images. The …

Privacy and security of healthcare data in cloud based on the blockchain technology

A Agarwal, R Joshi, H Arora… - 2023 7th International …, 2023 - ieeexplore.ieee.org
Blockchain is basically a conveyed database that contains records and public record for all
exchanges or computerized occasions that have been performed and shared among …

Randomly-based Stepwise Multi-Level Distributed Medical Image Steganography

A Munshi - Engineering, Technology & Applied Science Research, 2023 - etasr.com
Steganography deals with concealing sensitive information that can either be communicated
across a network or stored in a secured location. The concealment of information is …

Construction of 4× 4 substitution box using elliptic curves and algebraic group structures

S Arshad - Wireless Personal Communications, 2023 - Springer
The substitution box (S-box) is the only nonlinear component of any block cipher. It hides the
relationship between the key and the cipher text. Several methods are available in the …

Big data and ML: Interaction & Challenges

P Sen, R Jain, V Bhatnagar… - 2022 6th International …, 2022 - ieeexplore.ieee.org
A broad variety of applications are making use of machine learning (ML). In recent years, it's
been pushed to the forefront because of the advertising of big data. In the face of massive …

[PDF][PDF] A New Security Mechanism for Secured Communications Using Steganography and CBA

AA AB, A Gupta, S Ganapathy - ECTI Transactions on Computer …, 2022 - thaiscience.info
Article information: The quick advancement of computerized information trade has caused
data security to be of much significance in information transmission. As a huge measure of …

Security and Privacy in Social Network

A Agarwal, H Arora, S Mishra, G Rawat… - Sentiment Analysis and …, 2023 - Springer
For many people, social media has become an essential part of daily life. While many
people began by exchanging data in the form of text and images in the media sphere, others …

Reinforcement of medical image security through steganography and encryption techniques

F Khallaf, W El-Shafai, ESM El-Rabaie… - 2023 3rd …, 2023 - ieeexplore.ieee.org
Patients' data is stored in Electronic Health Records (EHRs) for confidentiality purposes.
However, the insecure networks of hospitals and clinics puts patient information at risk. To …

Enhanced Security of Digital Picture and Text Information with Hybride Model of Hiding and Encryption Techniques

H Arora, PK Sharma, K Mitanshi… - … Computing and Data …, 2022 - ieeexplore.ieee.org
In current development, for the exchanging of data, web is most notable and critical way.
With movement of web and information development, electronic media has become maybe …