Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secure reversible data hiding using block-wise histogram shifting
Reversible data hiding (RDH) techniques recover the original cover image after data
extraction. Thus, they have gained popularity in e-healthcare, law forensics, and military …
extraction. Thus, they have gained popularity in e-healthcare, law forensics, and military …
Hybrid cryptographic approach for internet ofhybrid cryptographic approach for internet ofthings applications: A review
Cryptography is described as the study of encrypting or secretCryptography is described as
the study of encrypting or secretwriting of data using logical and mathematical principles …
the study of encrypting or secretwriting of data using logical and mathematical principles …
An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps: Image encryption
Chaotic maps are extensively utilized in the field of image encryption to generate secret
keys. However, these maps suffer from hyper-parameters tuning issues. These parameters …
keys. However, these maps suffer from hyper-parameters tuning issues. These parameters …
An efficient algorithm for confidentiality, integrity and authentication using hybrid cryptography and steganography
Data/information is the most valuable asset for the modern electronic communication
system. To secure data or information has become a challenge in this competitive world …
system. To secure data or information has become a challenge in this competitive world …
Secure non real time image encryption algorithm development using cryptography & steganography
M Mukhedkar, P Powar… - 2015 Annual IEEE India …, 2015 - ieeexplore.ieee.org
In the current technology world, data transmission of various multimedia like sensitive
images, video, text is very important and security is major concern in the fields of medical …
images, video, text is very important and security is major concern in the fields of medical …
[PDF][PDF] A survey on recent approaches combining cryptography and steganography
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The …
applications in the Internet. Hence, a secure communication sessions must be provided. The …
[PDF][PDF] A systematic overview of secure image steganography
Information is a vital thing that needs to be secured and well protected during transmission
between two or more parties over the internet. This can be achieved by steganography …
between two or more parties over the internet. This can be achieved by steganography …
Achieving data integrity and confidentiality using image steganography and hashing techniques
Most existing steganography algorithms keen on achieving data confidentiality only by
embedding the data into a cover-media. This research paper introduced a new …
embedding the data into a cover-media. This research paper introduced a new …
[HTML][HTML] An Efficient Steganographic Protocol for WebP Files
Featured Application The methods of digital steganography in image files presented in this
research may find application in numerous areas and industries, because they offer great …
research may find application in numerous areas and industries, because they offer great …
Secure E-health using images steganography
The main aim is to secure the medical records by ensuring safe communication between the
sender and the receiver by adding multiple layers of security. This project is a combined …
sender and the receiver by adding multiple layers of security. This project is a combined …