Enhanced digital image and text data security using hybrid model of LSB steganography and AES cryptography technique

M Kumar, A Soni, ARS Shekhawat… - … conference on artificial …, 2022 - ieeexplore.ieee.org
In the present innovation, for the trading of information, the internet is the most well-known
and significant medium. With the progression of the web and data innovation, computerized …

[PDF][PDF] Simulation and analysis of hand gesture recognition for indian sign language using CNN

SK Alaria, A Raj, V Sharma, V Kumar - International Journal on …, 2022 - academia.edu
Sign Language Recognition is a device or program to help deaf and mute people. However,
communication has always been difficult for a person with verbal and physical disabilities …

A survey on AWS cloud computing security challenges & solutions

S Mishra, M Kumar, N Singh… - 2022 6th International …, 2022 - ieeexplore.ieee.org
Amazon offers a comprehensive range of IT solutions to let businesses construct their
private virtual clouds and maintain total control over their infrastructure. It is possible to use …

Secure data communication using information hiding and encryption algorithms

S Mishra, D Singh, D Pant… - 2022 Second international …, 2022 - ieeexplore.ieee.org
In today's innovation, for the information trade, the Internet is the best known and most
important medium. With the advancement of the web and data innovation, computerized …

[PDF][PDF] A Review on the Recent Trends of Image Steganography for VANET Applications.

AS Ansari - Computers, Materials & Continua, 2024 - cdn.techscience.cn
Image steganography is a technique of concealing confidential information within an image
without dramatically changing its outside look. Whereas vehicular ad hoc networks …

Enhanced Security of Digital Picture and Text Information with Hybride Model of Hiding and Encryption Techniques

H Arora, PK Sharma, K Mitanshi… - … Computing and Data …, 2022 - ieeexplore.ieee.org
In current development, for the exchanging of data, web is most notable and critical way.
With movement of web and information development, electronic media has become maybe …

MultiPhased Technique for Enhancing Security in Data Center Environment

AK Gangwar, U Lakhina… - 2024 International …, 2024 - ieeexplore.ieee.org
In the present scenario, Secured data transmission is crucial for effective communication.
Data integrity and security must be maintained during transfer. Encryption will be used for …

[PDF][PDF] Analysis of Asymmetric Cryptographic Algorithms: A Review

H Aroraa, SP Singhb, S Prasadc - ASM Group of Institutes …, 2023 - asmbusinessreview.in
Cryptography is a subject which is widely discussed and researched upon in the field of
computer science in domain of network security. In data communication it is essential to …

[PDF][PDF] Smart Robotic Car With GPS & GSM

HO Choumal, H Bhagnani, D Soni… - International Journal of … - academia.edu
In this paper we develop and test a Smart car Model that comprises ARDUINO-UNO,
sensors, GPS, GSM, LCD. Which is based on preventing vehicle from any hinderance and …

A Threshold-based Steganographic Approach for Improved Security with Payload and PSNR

I Khalid, M Asshad - International Research Journal of Advances in …, 2023 - irjacs.com
It is essential to ensure data security in the modern world where all our important information
is online. Security is the primary concern when sharing information over a communication …