Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Image steganography in spatial domain: A survey
This paper presents a literature review of image steganography techniques in the spatial
domain for last 5 years. The research community has already done lots of noteworthy …
domain for last 5 years. The research community has already done lots of noteworthy …
A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image
Image Steganography is a thriving research area of information security where secret data is
embedded in images to hide its existence while getting the minimum possible statistical …
embedded in images to hide its existence while getting the minimum possible statistical …
A security management framework for big data in smart healthcare
Big Data analytics in the medical sector can assist medical professionals to facilitate
improvement in healthcare. With the help of data analysis, clinical images of patients can be …
improvement in healthcare. With the help of data analysis, clinical images of patients can be …
CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
Abstract Information hiding is an active area of research where secret information is
embedded in innocent-looking carriers such as images and videos for hiding its existence …
embedded in innocent-looking carriers such as images and videos for hiding its existence …
[PDF][PDF] Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats
MM Hashim, MSM Rahim, FA Johi… - … of Engineering & …, 2018 - researchgate.net
Recently, Steganography is an outstanding research area which used for data protection
from unauthorized access. Steganography is defined as the art and science of covert …
from unauthorized access. Steganography is defined as the art and science of covert …
A novel steganography technique for digital images using the least significant bit substitution method
Communication has become a lot easier in this era of technology, development of high-
speed computer networks, and the inexpensive uses of Internet. Therefore, data …
speed computer networks, and the inexpensive uses of Internet. Therefore, data …
Reversible data hiding exploiting Huffman encoding with dual images for IoMT based healthcare
Continuous technological progressions and huge investments are made for the realization
of the various goals in the Internet of Things (IoT) driven networks. Internet of Medical Things …
of the various goals in the Internet of Things (IoT) driven networks. Internet of Medical Things …
A secure method for color image steganography using gray-level modification and multi-level encryption
Security of information during transmission is a major issue in this modern era. All of the
communicating bodies want confidentiality, integrity, and authenticity of their secret …
communicating bodies want confidentiality, integrity, and authenticity of their secret …
A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image
In the recent couple of years, due to the accelerated popularity of the internet, various
organizations such as government offices, military, private companies, etc. use different …
organizations such as government offices, military, private companies, etc. use different …
Image steganography for authenticity of visual contents in social networks
Social networks are major sources of image sharing and secret messaging among the
people. To date, such networks are not strictly bounded by copyright laws due to which …
people. To date, such networks are not strictly bounded by copyright laws due to which …