Publication:
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm

dc.contributor.authorBashar Izzeddin Issa Aljidien_US
dc.contributor.authorSundresan Perumalen_US
dc.contributor.authorSakinah Ali Pitchayen_US
dc.date.accessioned2024-05-29T02:28:10Z
dc.date.available2024-05-29T02:28:10Z
dc.date.issued2022
dc.date.submitted2023-2-4
dc.descriptionVolume: 28 No: 3 (page: 1573-1581)en_US
dc.description.abstractThe emphasis on data protection is improved in particular with respect to the transmission protocols utilized. Different research on numerous data protection areas such as authentication, encryption, hiding of data and validation were performed. In addition, a cybersecurity standard, such as IP-SEC, and secure sockets layer (SSL), were introduced to solve privacy infringement problems by applying encryption, authorization and protection to data exchanged and data stored in the cloud. This study suggests a new steganography algorithm, a data protection tool used to conceal massive amounts of data from graphic and statistic attacks in color images. The proposed algorithm is a multi-level steganography modified deep hiding/extracting technique (MDHET), which implements a selected least signified bit (SLSB) for color picture dispersal of the information. In addition, an accurate pixel location randomization feature has been applied. After MDHET, the predicted results will effectively conceal data up to 6 bpp (bit per pixel) with high safety levels by improving the quality of images. In addition, MDHET can be useful for encoding a deep series of images into one in which the testing procedure is carried out using regular reference images used in color image processing and compression analysis from different institutions.en_US
dc.identifier.doi10.11591/ijeecs.v28.i3.pp1573-1581
dc.identifier.epage1581
dc.identifier.issn2502-4760
dc.identifier.issue3
dc.identifier.spage1573
dc.identifier.urihttps://ijeecs.iaescore.com/index.php/IJEECS/article/view/30146
dc.identifier.urihttps://www.scopus.com/record/display.uri?eid=2-s2.0-85140216342&origin=resultslist&sort=plf-f&src=s&sid=3f1868111a303d5a05d758a34d75371e&sot=b&sdt=b&s=TITLE-ABS-KEY%28Securing+Data+Using+Deep+Hiding+Selected+The+Least+Significant+Bit+And+Adaptive+Swarm+Algorithm%29&sl=151&sessionSearchId=3f1868111a303d5a05d758a34d75371e
dc.identifier.urihttps://oarep.usim.edu.my/handle/123456789/10744
dc.identifier.volume28
dc.language.isoen_USen_US
dc.publisherIndonesian Journal of Electrical Engineering and Computer Scienceen_US
dc.relation.ispartofIndonesian Journal of Electrical Engineering and Computer Scienceen_US
dc.subjectAdvanced encryption standard encryption; Color images; Security; Selected least signified bit; Steganographyen_US
dc.titleSecuring Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithmen_US
dc.typeArticleen_US
dspace.entity.typePublication

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm.pdf
Size:
498.59 KB
Format:
Adobe Portable Document Format

Collections