2022
DOI: 10.11591/ijeecs.v28.i3.pp1573-1581
|View full text |Cite
|
Sign up to set email alerts
|

Securing data using deep hiding selected least significant bit and adaptive swarm algorithm

Abstract: The emphasis on data protection is improved in particular with respect to the transmission protocols utilized. Different research on numerous data protection areas such as authentication, encryption, hiding of data and validation were performed. In addition, a cybersecurity standard, such as IP-SEC, and secure sockets layer (SSL), were introduced to solve privacy infringement problems by applying encryption, authorization and protection to data exchanged and data stored in the cloud. This study suggests a new … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…On the other hand, the authors recommend the ontology tool that is equipped with rules, classifying security threats and automatically recommending controls that can be applied in the face of a threat [66], [67]. Other authors mention a neural network with artificial intelligence to perform queries and transfers of medical data in a secure way [68]- [71]. On the other hand, the author mentions that the defender software is a health industry computer network that goes against attacks, these network topologies are attractive that protect the information in real-time [72]- [74].…”
Section: What Technologies Are Immersed In the Healthcare Sector To A...mentioning
confidence: 99%
“…On the other hand, the authors recommend the ontology tool that is equipped with rules, classifying security threats and automatically recommending controls that can be applied in the face of a threat [66], [67]. Other authors mention a neural network with artificial intelligence to perform queries and transfers of medical data in a secure way [68]- [71]. On the other hand, the author mentions that the defender software is a health industry computer network that goes against attacks, these network topologies are attractive that protect the information in real-time [72]- [74].…”
Section: What Technologies Are Immersed In the Healthcare Sector To A...mentioning
confidence: 99%