Traditional image steganography focuses on concealing one image within another, aiming to avoid steganalysis by unauthorized entities. Coverless image steganography (CIS) …
D Rayappan, M Pandiyan - Wireless Networks, 2021 - Springer
The exponential rise in software computing and internet technologies have broadened the horizon of cloud computing applications serving numerous purposes like business …
D Madhu, S Vasuhi - Journal of Intelligent & Fuzzy Systems, 2023 - content.iospress.com
The role of communication technologies has become increasingly vital in various fields such as industrial communication, surveillance and monitoring, healthcare, and data …
R Shivhare, R Shrivastava… - … Conference on Advanced …, 2018 - ieeexplore.ieee.org
In Present communication environment the protection of Information ie (Data) is the biggest challenge in today's scenario. Image encryption technique should be designed in a way that …
The exponential up surge of cloud computing and multimedia data communication has alarmed academia-industries to develop more efficient and robust solution, especially …
P Chandarana, P Ahirao - International Journal Of Innovative …, 2018 - academia.edu
Advanced Image Steganography is used to develop a secure path for sending or receiving secret text messages. Using Chaff and Winnow& AES (Advanced Encryption Standard) …
IS Sacala, MA Moisescu, I Dumitrache… - 2019 E-Health and …, 2019 - ieeexplore.ieee.org
Emerging concepts and paradigms such as Internet of Things and Cyber-Physical Systems are influencing the development of e-health systems. State of the art e-health systems are …
A Sharma, R Chauhan, C Bhatt… - 2024 Asia Pacific …, 2024 - ieeexplore.ieee.org
This study deftly traverses the terrain of steganography and cryptography, offering a thorough examination of their diverse varieties and their essential roles in modern data …
A Dongre, C Gupta, S Dubey - International Conference on Advanced …, 2022 - Springer
Encryption technique is one of the major approaches for the security of the data in networking zone and intranet. Every type of data has its own characteristics; consequently …