Open Access
Issue
BIO Web Conf.
Volume 97, 2024
Fifth International Scientific Conference of Alkafeel University (ISCKU 2024)
Article Number 00069
Number of page(s) 8
DOI https://doi.org/10.1051/bioconf/20249700069
Published online 05 April 2024
  • Oleiwi, Z. C., Alawsi, W. A., Alisawi, W. C., Alfoudi, A. S., & Alfarhani, L. H. (2020, November). Overview and Performance Analysis of Encryption Algorithms. In Journal of Physics: Conference Series (Vol. 1664, No. 1, p. 012051). IOP Publishing. [CrossRef] [Google Scholar]
  • Brunot, J. M. (2019). The Increased Use of Steganography by Malware Creators to Obfuscate Their Malicious Code (Doctoral dissertation, Utica College). [Google Scholar]
  • Nath, A., Roy, S., Gopalika, C., & Mitra, D. (April 2017). Image Steganography using Encrypted Message. International Journal of Advanced Research in Computer Science and Management Studies, 5, no. 4, pp. 7–11 [Google Scholar]
  • Taha, M. S., Rahim, M. S. M., Lafta, S. A., Hashim, M. M., & Alzuabidi, H. M. (2019, May). Combination of steganography and cryptography: A short survey. In IOP conference series: materials science and engineering (Vol. 518, No. 5, p. 052003). IOP Publishing. [CrossRef] [Google Scholar]
  • Sharma, N., Bhatia, J. S., & Gupta, D. N. (2005). An encrypto-stego technique based secure data transmission system. PEC, Chandigarh. [Google Scholar]
  • Sharma, M. H., MithleshArya, M., & Goyal, M. D. (2013). Secure image hiding algorithm using cryptography and steganography. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN, 2278-0661. [Google Scholar]
  • Vijay, B., & Swathi, J. (2014). Implementation of digital Steganography using image files-a Computational approach. International Journal of Engineering Research and Development, 10(5), 6–10. [Google Scholar]
  • Gndu R.C.J. (2015). Dual layer security of data using LSB image steganography method and AES encryption algorithm. International Journal of Signal Processing, Image Processing and Pattern Recognition, 8(5), 259–266. [Google Scholar]
  • Abood, M. H., & Taha, Z. K. (2019). SECURE AND HIDDEN TEXT USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY. Journal of Engineering Science and Technology, 14(3), 1434–1450. [Google Scholar]
  • Varghese, A. E. (2015). Reconfigurable processor for image steganography using DCT with morphological operations. International Journal of Innovative Research in Computer and Communication Engineering, 3(9), 8053–8061. [Google Scholar]
  • Adee, R., & Mouratidis, H. (2022). A dynamic four-step data security model for data in cloud computing based on cryptography and steganography. Sensors, 22 (3), 1109. [CrossRef] [PubMed] [Google Scholar]
  • Shukur, W. A. (2017). Transmitted Data Encryption Using RC4 Algorithm Via Proposed Multi-tier Infrastructure Environment. Association of Arab Universities Journal of Engineering Sciences, 24(3), 88–100. [Google Scholar]
  • Hachim, E. A. W., Abbas, T., & Gaata, M. T. (2022, November). Modified RC4 Algorithm for Improve Data Protection in Cloud Environment. In 2022 International Conference on Information Technology Systems and Innovation (ICITSI) (pp. 295–299). IEEE. [CrossRef] [Google Scholar]
  • Stallings, W. (2003). Cryptography and Network Security: Princ iples and Practices,! Prentice Hall. Upper Saddle River, New Jersey, USA,. [Google Scholar]
  • Krenn, R. (2004). Steganography and steganalysis. [Google Scholar]
  • Fridrich, J., & Lisonek, P. (2007). Grid colorings in steganography. IEEE Transactions on Information Theory, 53(4), 1547–1549. [CrossRef] [Google Scholar]
  • Sabeti, V., Sobhani, M., & Hasheminejad, S. M. H. (2022). An adaptive image steganography method based on integer wavelet transform using genetic algorithm. Computers and Electrical Engineering, 99, 107809. [CrossRef] [Google Scholar]
  • Moumen, A., & Sissaoui, H. (2017). Images encryption method using steganographic LSB method, AES and RSA algorithm. Nonlinear Engineering, 6(1), 53–59. [CrossRef] [Google Scholar]
  • Mustafa, C. & Elmasry, W. (2018). New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check. Sadhana, 43 (5), 68. [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.