Investigating the Effectiveness of Artificial Intelligence in Watermarking and Steganography for Digital Media Security DOI

Shadan Mohammed Jihad Abdalwahid,

Wassan Adnan Hashim,

Mohammed Ganim Saeed

et al.

Published: April 22, 2024

Watermarking and Steganography are methods of embedding digital information within images or other media, such as text audio, for the purpose Copyright Protection covert communication. This field study is not recent has been ongoing several years, culminating in its current advanced stage. The utilization Artificial Intelligence algorithms played a pivotal role revolutionizing various aspects, including security concerns precision outcomes, compared to traditional methods. paper focuses on doing an in-depth analysis cutting-edge research, techniques, methodologies employed domain Steganography, specifically conjunction with Intelligence. By thoroughly examining evaluating collection studies this domain, we have scrutinized outcomes each respect research goal, acquired results, algorithm, research's robustness terms susceptibility forms attacks technique data embedding. Our findings indicate that use substantial influence enhancing result precision, system resilience, establishing ownership. Deep Neural Networks (DNN) essential due their robustness, effectiveness, accuracy. Novel systems improve security, incorporation rates, detection, speed convergence. learning being investigated techniques concealment, hiding, steganography security.

Language: Английский

Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data DOI Creative Commons
Morteza SaberiKamarposhti,

Kok-Why Ng,

Fang-Fang Chua

et al.

Heliyon, Journal Year: 2024, Volume and Issue: 10(10), P. e31406 - e31406

Published: May 1, 2024

As healthcare systems transition into an era dominated by quantum technologies, the need to fortify cybersecurity measures protect sensitive medical data becomes increasingly imperative. This paper navigates intricate landscape of post-quantum cryptographic approaches and emerging threats specific sector. Delving encryption protocols such as lattice-based, code-based, hash-based, multivariate polynomial cryptography, addresses challenges in adoption compatibility within systems. The exploration potential posed attacks vulnerabilities existing standards underscores urgency a change basic assumptions security. provides detailed roadmap for implementing solutions, considering unique faced organizations, including integration issues, budget constraints, specialized training. Finally, abstract concludes with emphasis on importance timely strategies ensure resilience face evolving threats. not only offers practical insights securing but also serves guide future directions dynamic cybersecurity.

Language: Английский

Citations

5

A hybrid elliptic curve cryptography (HECC) technique for fast encryption of data for public cloud security DOI Creative Commons

B. Ranganatha Rao,

B. Sujatha

Measurement Sensors, Journal Year: 2023, Volume and Issue: 29, P. 100870 - 100870

Published: July 17, 2023

Cloud computing provides the users a centralized place for data storage and other commercial applications. To guarantee everything is secure, cloud security has to handle all devices, apps, connected cloud. Because of cloud's robust security, applications may be accessed by relevant people. The usage public ensures that customers always have trustworthy method accessing apps data, which in turn enables service providers resolve any potential problems as soon they arise. This paper presents technique using Hybrid Elliptic Curve Cryptography (HECC). proposed approach makes keys lightweight Edwards curve. user's Identity Based Encryption used change generated private keys. key reduction make even shorter, speeds up Advanced standard (AES) encryption process. are exchanged Diffie Hellman exchange. Throughput generation, encryption, decryption times evaluate how well suggested model performs. fared better than current models every way. method's creation process takes 0.000025 seconds, while resulting 0.00349 seconds. achieved throughput 693.10 KB/sec..

Language: Английский

Citations

12

PRISMA Archetype-Based Systematic Literature Review of Security Algorithms in the Cloud DOI Open Access
John Kwao Dawson, Frimpong Twum,

James Benjamin Hayfron Acquah

et al.

Security and Communication Networks, Journal Year: 2023, Volume and Issue: 2023, P. 1 - 17

Published: July 3, 2023

Industries have embraced cloud computing for their daily operations due to the volume of data they create. As generation and consumption increased, challenges opportunities also increased. Researchers proposed various cryptographic schemes secure on cloud. Regardless multiple proposed, security remains an obstacle computing’s widespread adoption. Also, these schemes’ run times are proportional sizes, motivating excessive CPU engagement during execution huge data, which has consequences need high bandwidth transfer This systematic review tries uncover most often used time trends attain confidentiality privacy data. The study considered published articles from well-known databases such as Taylor & Francis, Scopus, Research Gate, Web Science, IEEE Xplore, Science Direct, Hindawi, Google Scholar, Sage, Emerald, Wiley Online Library, ACM 2016 2022. Preferred Reporting Items Systematic Reviews Meta-Analyses (PRISMA) guidelines were select 73 works this using keyword searching. Data that received greatest attention in with encryption techniques common solution. From study, 90% produced linear times. investigation discovered nonlinear symmetric stream cipher methods infrequently employed protect secrecy

Language: Английский

Citations

6

IABHE: Identity and Attribute-based Honey Encryption Algorithm and Deep Learning-based Key Generation for Securing Big Data in Hadoop Framework DOI Creative Commons
Reshma Siyal, Jun Long

Research Square (Research Square), Journal Year: 2024, Volume and Issue: unknown

Published: March 29, 2024

Abstract Nowadays, Hadoop is considered promising to store and reliably process big data in the cloud computing platform, it also provides low-cost flexible services for large amounts of data. However, possibility malicious attacks on stored or processed has increased due absence inherent security mechanisms Hadoop. In this approach, an Identity Attribute-Based Honey Encryption Algorithm (IABHE) developed encryption offer framework. Here, system model initially. Then, acquired input applied MapReduce framework, where performed by IABHE, which incorporates identity attribute-based with honey encryption. Moreover, a deep learning model, PyramidNet utilized generation secret keys used encrypted obtained mapper phase aggregated performing polynomial interpolation reducer phase. Finally, securely saved cloud. efficiency IABHE evaluated utilizing various performance metrics attained better values time at 17.756sec, decryption 8.767sec, key complexity 0.368.

Language: Английский

Citations

1

Blockchain Enabled Hadoop Distributed File System Framework for Secure and Reliable Traceability DOI Creative Commons
Manish Kumar Gupta, Rajendra Kumar Dwivedi

ADCAIJ ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL, Journal Year: 2023, Volume and Issue: 12, P. e31478 - e31478

Published: Dec. 29, 2023

Hadoop Distributed File System (HDFS) is a distributed file system that allows large amounts of data to be stored and processed across multiple servers in cluster. HDFS also provides high throughput for access. enables the management vast using commodity hardware. However, security vulnerabilities can manipulated malicious purposes. This emphasizes significance establishing strong measures facilitate sharing within implementing reliable mechanism verifying legitimacy shared files. The objective this paper enhance by utilizing blockchain-based technique. proposed model uses Hyperledger Fabric platform at enterprise level leverage metadata files, thereby dependable traceability HDFS. analysis results indicates incurs slightly higher overhead compared requires more storage space. considered an acceptable trade-off improved security.

Language: Английский

Citations

2

Investigating the Effectiveness of Artificial Intelligence in Watermarking and Steganography for Digital Media Security DOI

Shadan Mohammed Jihad Abdalwahid,

Wassan Adnan Hashim,

Mohammed Ganim Saeed

et al.

Published: April 22, 2024

Watermarking and Steganography are methods of embedding digital information within images or other media, such as text audio, for the purpose Copyright Protection covert communication. This field study is not recent has been ongoing several years, culminating in its current advanced stage. The utilization Artificial Intelligence algorithms played a pivotal role revolutionizing various aspects, including security concerns precision outcomes, compared to traditional methods. paper focuses on doing an in-depth analysis cutting-edge research, techniques, methodologies employed domain Steganography, specifically conjunction with Intelligence. By thoroughly examining evaluating collection studies this domain, we have scrutinized outcomes each respect research goal, acquired results, algorithm, research's robustness terms susceptibility forms attacks technique data embedding. Our findings indicate that use substantial influence enhancing result precision, system resilience, establishing ownership. Deep Neural Networks (DNN) essential due their robustness, effectiveness, accuracy. Novel systems improve security, incorporation rates, detection, speed convergence. learning being investigated techniques concealment, hiding, steganography security.

Language: Английский

Citations

0