Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic review on cover selection methods for steganography: Trend analysis, novel classification and analysis of the elements
Cover selection is the process of selecting a suitable cover for steganography. Cover
selection is crucial to maintain the steganographic characteristics performances and further …
selection is crucial to maintain the steganographic characteristics performances and further …
[HTML][HTML] FuzConvSteganalysis: Steganalysis via fuzzy logic and convolutional neural network
Emerging technologies based on the advancements in Deep Learning (DL) induced several
alternative approaches to address intricate problems, such as analyzing images in the …
alternative approaches to address intricate problems, such as analyzing images in the …
Advanced audio coding steganography algorithm with distortion minimization model based on audio beat
X Zhang, C Li, L Tian - Computers and Electrical Engineering, 2023 - Elsevier
Currently, most advanced audio coding (AAC) steganography methods are content-non-
adaptive without considering the characteristics of audio, and there are several limitations in …
adaptive without considering the characteristics of audio, and there are several limitations in …
Ameliorating LSB using piecewise linear chaotic map and one-time pad for superlative capacity, imperceptibility and secure audio steganography
HT Elshoush, MM Mahmoud - IEEE Access, 2023 - ieeexplore.ieee.org
Audio steganography hides a secret message into an audio. Existing techniques are lacking
in achieving high payload, imperceptibility in addition to robustness at the same time. They …
in achieving high payload, imperceptibility in addition to robustness at the same time. They …
From covert hiding to visual editing: robust generative video steganography
Traditional video steganography methods are based on modifying the covert space for
embedding, whereas we propose an innovative approach that embeds secret message …
embedding, whereas we propose an innovative approach that embeds secret message …
Hiding scrambled text messages in speech signals using a lightweight hyperchaotic map and conditional LSB mechanism
This study presents a lightweight, secure audio steganography system for hiding text
messages for transmission over the Internet, with the aim of addressing the current problems …
messages for transmission over the Internet, with the aim of addressing the current problems …
A simple and efficient data hiding method with error detection and correction
In recent years, data hiding techniques have emerged as a prominent area of research due
to the increasing demand for information security. Existing data hiding techniques typically …
to the increasing demand for information security. Existing data hiding techniques typically …
A deep learning-driven multi-layered steganographic approach for enhanced data security
In the digital era, ensuring data integrity, authenticity, and confidentiality is critical amid
growing interconnectivity and evolving security threats. This paper addresses key limitations …
growing interconnectivity and evolving security threats. This paper addresses key limitations …
A combination of RSA algorithm with image steganography to ensure enhanced encryption
B Karthikeyan, B Bharathkumar… - … on Electronics and …, 2023 - ieeexplore.ieee.org
Data is a collection of raw facts and there are lots of ways to protect it securely. Cryptography
and steganography play crucial roles in the protection of data in the modern world. In order …
and steganography play crucial roles in the protection of data in the modern world. In order …
A Robust Technique for Steganography of Enhanced Audio Signals
Audio steganography is a tool for concealing data (a secret message) inside an audio signal
(a carrier). It is regarded as an essential approach for information security. This paper …
(a carrier). It is regarded as an essential approach for information security. This paper …