Secure and low-complexity medical image exchange based on compressive sensing and lsb audio steganography

W Al-Chaab, ZA Abduljabbar, EW Abood… - Informatica, 2023 - informatica.si
Patients' data constitutes the vast majority of information exchanged over the Internet. The
magnitude of maintaining its security and privacy directly correlates to the importance and …

[PDF][PDF] Provably secure and efficient audio compression based on compressive sensing

EW Abood, ZA Hussien, HA Kawi… - International Journal of …, 2023 - academia.edu
The advancement of systems with the capacity to compress audio signals and
simultaneously secure is a highly attractive research subject. This is because of the need to …

A robust audio steganography technique based on image encryption using different chaotic maps

MA Nasr, W El-Shafai, ESM El-Rabaie… - Scientific Reports, 2024 - nature.com
The development of innovative methods for concealing critical data in multimedia files has
exploded in information security in recent years. Cryptography and steganography cannot …

Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism

MA Al Sibahee, ZA Abduljabbar, C Luo, J Zhang… - Plos one, 2024 - journals.plos.org
This study presents a lightweight, secure audio steganography system for hiding text
messages for transmission over the Internet, with the aim of addressing the current problems …

[PDF][PDF] User identification system for inked fingerprint pattern based on central moments

EJ Baker, SA Alazawi, NT Ahmed, MA Ismail… - Indonesian Journal of …, 2021 - academia.edu
The use of the fingerprint recognition has been and remains very important in many security
applications and licensing systems. Fingerprint recognition is required in many areas such …

Authentication and security aspect of information privacy using anti-forensic audio–video embedding technique

SK Moon - Inventive Systems and Control: Proceedings of ICISC …, 2022 - Springer
Presently, fraud in online data transmission becomes a more critical and serious issue due
to its security and authentication. This paper contributes and provides the correct path to …

Securing speech transmission based on DNA and S-Box techniques

SM Abdullah, IQ Abduljaleel - AIP Conference Proceedings, 2023 - pubs.aip.org
Speech signal scrambling and encryption are important multimedia technologies. These
technologies are required in the field of speech to satisfy the security and privacy of …

A discrete wavelet transform-based audio watermarking technique for digital security

V Prabhu, L Sundar, V Drishya… - International …, 2022 - inderscienceonline.com
This work proposes a model using discrete wavelet transform (DWT) to eliminate the attacks
on digital security. Semi-fragile watermarking techniques strive towards establishing the …

[PDF][PDF] Video steganography using 3D distance calculator based on YCbCr color components

EJ Baker, AA Majeed, SA Alazawi, S Kasim… - Indonesian Journal of …, 2021 - core.ac.uk
Steganography techniques have taken a major role in the development in the field of
transferring multimedia contents and communications. Therefore, field of steganography …

An Enhanced Steganography Approach for Concealing Audio in Images Using Double Density-Dual Tree Wavelet Transform.

SA AbdAl-Hameed, HN Abdullah… - Revue d' …, 2023 - search.ebscohost.com
Steganography, the art of concealing information within another message or physical object
to evade detection, has potential applications across multiple digital content types, including …