Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Double-layer image security scheme with aggregated mathematical sequences
Information security has been a major concern since the evolution of technology. Nowadays,
internet users' are increasing and their information is being shared almost every second …
internet users' are increasing and their information is being shared almost every second …
Applications of data hiding techniques in medical and healthcare systems: a survey
H Sajedi - Network Modeling Analysis in Health Informatics and …, 2018 - Springer
Nowadays, scientists make effort to provide security for the communication channels.
Several security and privacy threats are introduced via the Internet as the major …
Several security and privacy threats are introduced via the Internet as the major …
A review on image steganographic techniques based on optimization algorithms for secret communication
This review paper explores the use of optimization techniques in steganography, the art of
hiding secret information within other data. Steganography is a field that has gained …
hiding secret information within other data. Steganography is a field that has gained …
Performance enhanced image steganography systems using transforms and optimization techniques
Image steganography is the art of hiding highly sensitive information onto the cover image.
An ideal approach to image steganography must satisfy two factors: high quality of stego …
An ideal approach to image steganography must satisfy two factors: high quality of stego …
Stega4NeRF: cover selection steganography for neural radiance fields
W Dong, J Liu, L Chen, W Sun… - Journal of Electronic …, 2024 - spiedigitallibrary.org
The implicit neural representation of visual data (such as images, videos, and 3D models)
has become a current hotspot in computer vision research. This work proposes a cover …
has become a current hotspot in computer vision research. This work proposes a cover …
Information-theoretic bounds for steganography in visual multimedia
Steganography in visual multimedia embeds data into an image or video cover object and
produces a corresponding stego object with some distortion. Establishing an upper bound …
produces a corresponding stego object with some distortion. Establishing an upper bound …
Efficient cover image selection based on spatial block analysis and DCT embedding
In steganography, the cover medium is widely treated as a mere container for the embedded
information, even though it affects the stego-image quality, security, and robustness. In …
information, even though it affects the stego-image quality, security, and robustness. In …
Image steganalysis using artificial bee colony algorithm
H Sajedi - Journal of ExpErimEntal & thEorEtical artificial …, 2017 - Taylor & Francis
Steganography is the science of secure communication where the presence of the
communication cannot be detected while steganalysis is the art of discovering the existence …
communication cannot be detected while steganalysis is the art of discovering the existence …
Transmitting hidden information using steganography via Facebook
Social networking websites, specifically Facebook, offer means of reaching wide audiences
to share information, including photos, documents, and videos. Social networks post …
to share information, including photos, documents, and videos. Social networks post …
[PDF][PDF] Image Steganography using Hybrid Edge Detector and Ridgelet Transform.
SU Maheswari, DJ Hemanth - Defence Science Journal, 2015 - researchgate.net
Steganography is the art of hiding high sensitive information in digital image, text, video, and
audio. In this paper, authors have proposed a frequency domain steganography method …
audio. In this paper, authors have proposed a frequency domain steganography method …