Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Data Transmission between IoT Modules using Audio Steganography
Data in sensor networks, transmitted usually between IoT modules, should be protected from
unauthorized access to prevent erroneous actions with fatal consequences. Methods should …
unauthorized access to prevent erroneous actions with fatal consequences. Methods should …
Embedding and Extraction of Data in Speech for Covert Communication
VK Swamy, R Arthi, MS Srujana, M Sushmitha… - … Conference on Data …, 2023 - Springer
This paper proposes an implementation of speech steganography in real-time for data
concealment. Speech steganography is a technique that allows for the covert …
concealment. Speech steganography is a technique that allows for the covert …
[CITAZIONE][C] Enhancing Data Protection and Covert Communication in Cloud Environments with Isogeny-based Cryptography and Spread Spectrum Steganography
D Shivaramakrishna, M Nagaratna - 2025