Highly improved DNA based steganography

P Malathi, M Manoaj, R Manoj, V Raghavan… - Procedia Computer …, 2017 - Elsevier
Steganography facilitates to conceal the confidential information within mediums like image,
video, audio, DNA, etc. In this paper, the DNA steganography is developed by using …

DNA based image steganography

RE Vinodhini, P Malathi - Computational vision and bio inspired …, 2018 - Springer
Providing security to all kinds of data is an essential task in the world of digital data. The data
can be secured using the several methods like cryptography, steganography and …

A steganographic analysis using batch steganography

SS Varthakavi, P Mohan, A Gupta… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Steganography is a scheme to conceal a secret file inside another means of information,
also known as a cover, which can be retrieved at the destination. It is an approach that …

A Framework for Medical Image Steganography with Modified LSB and Hamming Code

B Ramapriya, Y Kalpana - 2024 Fourth International …, 2024 - ieeexplore.ieee.org
Steganography comes from Greek word" steganos", meaning" Covered Writing". Having
access to the internet has enabled large amounts of data to be transferred quickly and in …

Information Hiding Through a Novel DNA Steganography Technique to Secure Text Communication

NB Sadia, M Hasan, MR Islam - Cyber Security and Business …, 2023 - taylorfrancis.com
Secure communication systems often include information protection as one of their primary
functions. Digital communication devices send and receive millions of bytes of data every …

[PDF][PDF] A Highly Secured Image Steganography using Bernoulli's Chaotic Map and Binary Hamming Code

RE Vinodhini, K Vimalkumar, P Malathi… - International Journal of …, 2018 - academia.edu
The internet is used by almost all people to communicate, send and receive information. The
data which are transferred through the internet are liable to attack since it is an open …

An Improved Dna Cryptography Algorithm Using Residue Number System

HL Salaudeen - 2021 - search.proquest.com
In this information rich era, data protection is needed to ensure swift and secure
communication through a digital medium. Data need to be protected from unauthorized …

An Enhanced Image Cryptosystem Using Blowfish and Diffie-Hellman with Residue Number System

A Yunusa - 2021 - search.proquest.com
With the rapid progress in internet and digital imaging technology, there are more and more
ways to easily create, publish and distribute images. The major issue for computer networks …

An improved approach for securing document images using dual cover

RE Vinodhini, P Malathi, T Gireesh Kumar - Advances in Signal …, 2018 - Springer
Security is essential to all varieties of data that is transmitted through an open network or the
internet. Steganography is such a technique which provides security for any kind of data by …

[引用][C] Artificial Intelligence and High Performance Computing

P Gandhi, S Adarsh, KI Ramachandran, A Agarwal…