<div>The security of data over the internet is a crucial</div><div>thing specially if this data is personal or confidential. The</div><div>transmitted data can be intercepted during its journey from</div><div>device to another. For that reason, we are willing to develop</div><div>a simple method to secure data. Data encryption is one method to secure the messages but the intruders can still try to crack it, in order to overcome this, steganography has been used to hide the data into a cover media(i.e. audio, image or video). Recently steganography attracts many researchers as a hot topic. This paper proposes an advanced technique for encrypting data</div><div>using Advanced Encryption System (AES) and hiding the data using Haar Discreet Wav...
A high demand on digital information in the last decade raises serious concern to protect its secrec...
Today, the world is experiencing a new paradigm characterized by dynamism and rapid change due to re...
[[abstract]]In this paper, we proposed a novel stegangraphy method utilizing the features obtained f...
Protecting private data exchanged over the Internet, and who can access these data has become a grow...
Secret communication over network has captured the imagination of researchers for many years. Stegan...
In the field of Data Communication, security issues are the top priority.Cryptography and steganogra...
In the field of Data Communication, security issues are the top priority.Cryptography and steganogra...
Abstract—This Steganography is the skills of concealing secrete information into other object like i...
Abstract — Steganography is the technique of hiding information so that any intermediate third party...
AbstractSteganography and cryptography methods are used together with wavelets to increase the secur...
The modern steganography presents a challenging task of embedding data that should be imperceptible ...
Abstract — This research paper is concerned with the steganography in a digital image. Steganography...
This paper proposes the use of various transforms for image steganography. It focuses on use of wave...
Data security has become a paramount necessity and more obligation in daily life. Most of our system...
The information security has become one of the most significant problems in data communication. So i...
A high demand on digital information in the last decade raises serious concern to protect its secrec...
Today, the world is experiencing a new paradigm characterized by dynamism and rapid change due to re...
[[abstract]]In this paper, we proposed a novel stegangraphy method utilizing the features obtained f...
Protecting private data exchanged over the Internet, and who can access these data has become a grow...
Secret communication over network has captured the imagination of researchers for many years. Stegan...
In the field of Data Communication, security issues are the top priority.Cryptography and steganogra...
In the field of Data Communication, security issues are the top priority.Cryptography and steganogra...
Abstract—This Steganography is the skills of concealing secrete information into other object like i...
Abstract — Steganography is the technique of hiding information so that any intermediate third party...
AbstractSteganography and cryptography methods are used together with wavelets to increase the secur...
The modern steganography presents a challenging task of embedding data that should be imperceptible ...
Abstract — This research paper is concerned with the steganography in a digital image. Steganography...
This paper proposes the use of various transforms for image steganography. It focuses on use of wave...
Data security has become a paramount necessity and more obligation in daily life. Most of our system...
The information security has become one of the most significant problems in data communication. So i...
A high demand on digital information in the last decade raises serious concern to protect its secrec...
Today, the world is experiencing a new paradigm characterized by dynamism and rapid change due to re...
[[abstract]]In this paper, we proposed a novel stegangraphy method utilizing the features obtained f...