Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing
A Gutub - CAAI Transactions on Intelligence Technology, 2023 - Wiley Online Library
This study presents enhancing images authentication by securing watermarking hidden data
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …
Optimized multimedia data through computationally intelligent algorithms
In the field of data exchange, the security of information is the critical aspect. This void in the
security helped the evolution of steganography to address the problem of security …
security helped the evolution of steganography to address the problem of security …
A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques
MA Hameed, OA Abdel-Aleem… - Journal of Ambient …, 2023 - Springer
With remarkable information technology development, information security has become a
major concern in the communication environment, where security must be performed for the …
major concern in the communication environment, where security must be performed for the …
A novel image steganographic method based on integer wavelet transformation and particle swarm optimization
Image steganography is a technique of hiding secret data into a cover image and so as to
prevent the intruders from accessing the secret data. The efficiency of image steganography …
prevent the intruders from accessing the secret data. The efficiency of image steganography …
Double-matrix decomposition image steganography scheme based on wavelet transform with multi-region coverage
P Pan, Z Wu, C Yang, B Zhao - Entropy, 2022 - mdpi.com
On the basis of ensuring the quality and concealment of steganographic images, this paper
proposes a double-matrix decomposition image steganography scheme with multi-region …
proposes a double-matrix decomposition image steganography scheme with multi-region …
Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography
The Internet is used for exchanging information. Sometimes it is required to transmit
confidential data over the internet. Here the authors use image steganography to embed …
confidential data over the internet. Here the authors use image steganography to embed …
Refining image steganography distribution for higher security multimedia counting-based secret-sharing
Counting-based secret sharing is becoming a vital efficient multimedia technique for raising
the security of sensitive data especially when collective access to data are essential. Secret …
the security of sensitive data especially when collective access to data are essential. Secret …
A flexible and visually meaningful multi-image compression, encryption and hiding scheme based on 2D compressive sensing
D Huo, Z Zhu, X Zhou, L Wei, X Bai, Y Bai, C Han - Heliyon, 2023 - cell.com
Background: Encrypting plain images into noise-like cipher images is a common method in
image encryption. However, when noise-like images appear in public networks, they are …
image encryption. However, when noise-like images appear in public networks, they are …
[HTML][HTML] Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure
PD Shah, RS Bichkar - … Science and Technology, an International Journal, 2021 - Elsevier
In all forms of confidential communication, the most significant element is security.
Cryptography can be used to secure the information, but it discloses the presence of covert …
Cryptography can be used to secure the information, but it discloses the presence of covert …
Embau: A novel technique to embed audio data using shuffled frog lea** algorithm
The aim of steganographic algorithms is to identify the appropriate pixel positions in the host
or cover image, where bits of sensitive information can be concealed for data encryption …
or cover image, where bits of sensitive information can be concealed for data encryption …