Image steganography approaches and their detection strategies: A survey

MH Kombrink, ZJMH Geradts, M Worring - ACM Computing Surveys, 2024 - dl.acm.org
Steganography is the art and science of hidden (or covered) communication. In digital
steganography, the bits of image, video, audio and text files are tweaked to represent the …

Image data hiding schemes based on metaheuristic optimization: a review

A Melman, O Evsutin - Artificial Intelligence Review, 2023 - Springer
The digital content exchange on the Internet is associated with information security risks.
Hiding data in digital images is a promising direction in data protection and is an alternative …

[HTML][HTML] Ensemble deep learning derived from transfer learning for classification of COVID-19 patients on hybrid deep-learning-based lung segmentation: a data …

AK Dubey, GL Chabert, A Carriero, A Pasche… - Diagnostics, 2023 - mdpi.com
Background and motivation: Lung computed tomography (CT) techniques are high-
resolution and are well adopted in the intensive care unit (ICU) for COVID-19 disease …

[HTML][HTML] Monitoring the security of audio biomedical signals communications in wearable IoT healthcare

S Yazdanpanah, SS Chaeikar, A Jolfaei - Digital Communications and …, 2023 - Elsevier
The COVID-19 pandemic has imposed new challenges on the healthcare industry as
hospital staff are exposed to a massive coronavirus load when registering new patients …

Minor blind feature based Steganalysis for calibrated JPEG images with cross validation and classification using SVM and SVM-PSO

DD Shankar, AS Azhakath - Multimedia Tools and Applications, 2021 - Springer
The spectacular progress of technology related to the information and communication arena
throughout the past epoch made the internet a powerful media for faster communication of …

Adult content image recognition by Boltzmann machine limited and deep learning

S Karamizadeh, S Shojae Chaeikar, A Jolfaei - Evolutionary Intelligence, 2023 - Springer
Adult content images have a detrimental effect on Internet users, a significant number of
whom are minors. Therefore, it is essential to control and detecting adult content images …

An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems

SS Chaeikar, M Alizadeh, MH Tadayon… - … Journal of Intelligent …, 2022 - Wiley Online Library
For secure communication in a distributed cooperation, generally, the data are encrypted
and decrypted using a symmetric key. The process of creating, distributing, storing …

[HTML][HTML] PFW: polygonal fuzzy weighted—an SVM kernel for the classification of overlap** data groups

S Shojae Chaeikar, AA Manaf, AA Alarood, M Zamani - Electronics, 2020 - mdpi.com
Support vector machines are supervised learning models which are capable of classifying
data and measuring regression by means of a learning algorithm. If data are linearly …

Feature extraction optimization of JPEG steganalysis based on residual images

Z **, G Feng, Y Ren, X Zhang - Signal Processing, 2020 - Elsevier
JPEG steganalysis is a technique for detecting the existence of secret information hidden in
JPEG images. At present, JPEG steganalysis based on residual images has been widely …

Security principles and challenges in electronic voting

SS Chaeikar, A Jolfaei, N Mohammad… - 2021 IEEE 25th …, 2021 - ieeexplore.ieee.org
An electronic voting system aims to cast and record votes of the legitimate voters while
providing an adequate level of security in the way the votes are cast. These require …