Video steganography: A review
Y Liu, S Liu, Y Wang, H Zhao, S Liu - Neurocomputing, 2019 - Elsevier
Video steganography is becoming an important research area in various data hiding
technologies, which has become a promising tool because not only the security requirement …
technologies, which has become a promising tool because not only the security requirement …
A novel reversible data hiding algorithm based on probabilistic XOR secret sharing in wavelet transform domain
In recent years, a lot of data hiding algorithms have been proposed in the literature.
Providing high payload capacity, high visual quality, and robustness is the main aim of data …
Providing high payload capacity, high visual quality, and robustness is the main aim of data …
On Multi-image Random Grids by Arbitrary Transformations
Random grids are a method for visual secret sharing, whereby a secret image is encoded
into a number of shares, each of which is maximally entropic. There has been growing …
into a number of shares, each of which is maximally entropic. There has been growing …
Multiple Information Hiding in General Access Structure Visual Cryptography Using Q'tron Neural Network
S Gurung, M Chakravorty - … of International Conference on ICACCP 2017 …, 2018 - Springer
With the advent of the widespread use of Internet for communication, there is an increase in
exchange of personal secured information via the Internet wherein a large variety of …
exchange of personal secured information via the Internet wherein a large variety of …
Binary Image Random Grid (2, n)-Visual Cryptography Scheme
Majority of the data security ensures scientific systems. What's more related viewpoints on
furnish for confidentiality, information security, substance Con-firmation Furthermore …
furnish for confidentiality, information security, substance Con-firmation Furthermore …
Color Image Encryption by Random Circular Visual Cryptography
VH Borkhatariya, YB Shukla… - Think India Journal, 2019 - thinkindiaquarterly.org
Abstract Information security is the most important part in the research and development
area, government, industry, organization, etc. Recently, cybercrime or related hacking …
area, government, industry, organization, etc. Recently, cybercrime or related hacking …
[PDF][PDF] Secret sharing scheme Circular Visual Cryptography for Color Images
S Parmar, SD Degadwala - 2019 - academia.edu
Data security is the most significant part of the innovative work territory, government,
industry, association, and so forth. As of late, cybercrime or related hacking issue increments …
industry, association, and so forth. As of late, cybercrime or related hacking issue increments …
Self-organizing patterns in information hiding applications
M Vaidelys - 2018 - epubl.ktu.edu
The importance of hiding information when transferring data has been highlighted since the
early days of communication. Even though initially information hiding was mainly used in …
early days of communication. Even though initially information hiding was mainly used in …
[CITAS][C] Encrypting Binary and Gray-scale Images Using RandomCircular Visual Cryptography
BK Bhardwaj, T Singh, K Gupta, H Pandey, A Tiwari - RES MILITARIS, 2023