4.2 Article

A Novel Scrambled Data Hiding Approach Towards Securing Sensitive Data

Related references

Note: Only part of the references are listed.
Article Multidisciplinary Sciences

Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications

Ahmed A. Abd El-Latif et al.

SCIENTIFIC REPORTS (2020)

Article Computer Science, Information Systems

A New Chaotic Map With Dynamic Analysis and Encryption Application in Internet of Health Things

Nestor Tsafack et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

Efficient quantum-based security protocols for information sharing and data protection in 5G networks

Ahmed A. Abd EL-Latif et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Performance Analysis and Implementation of DES Algorithm and RSA Algorithm with Image and Audio Steganography Techniques

Ankit Gambhir et al.

COMPUTING, COMMUNICATION AND SIGNAL PROCESSING, ICCASP 2018 (2019)

Proceedings Paper Engineering, Electrical & Electronic

Image Steganography In Securing Sound File Using Arithmetic Coding Algorithm, Triple Data Encryption Standard (3DES) and Modified Least Significant Bit (MLSB)

A. B. Nasution et al.

INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONICS, COMPUTER, AND INDUSTRIAL TECHNOLOGY (2018)

Article Computer Science, Hardware & Architecture

Data hiding in scrambled images: A new double layer security data hiding technique

Shabir A. Parah et al.

COMPUTERS & ELECTRICAL ENGINEERING (2014)

Article Optics

A new meaningful secret sharing scheme based on random grids, error diffusion and chaotic encryption

Ahmed A. Abd El-Latif et al.

OPTICS AND LASER TECHNOLOGY (2013)