Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Video steganography: A review
Y Liu, S Liu, Y Wang, H Zhao, S Liu - Neurocomputing, 2019 - Elsevier
Video steganography is becoming an important research area in various data hiding
technologies, which has become a promising tool because not only the security requirement …
technologies, which has become a promising tool because not only the security requirement …
Compressed and raw video steganography techniques: a comprehensive survey and analysis
In the last two decades, the science of covertly concealing and communicating data has
acquired tremendous significance due to the technological advancement in communication …
acquired tremendous significance due to the technological advancement in communication …
Efficient HEVC steganography approach based on audio compression and encryption in QFFT domain for secure multimedia communication
Abstract High-Efficiency Video Coding (HEVC) is the most recent video codec standard. It is
substantial to analyze the HEVC steganography process due to its practical and academic …
substantial to analyze the HEVC steganography process due to its practical and academic …
A survey on information hiding using video steganography
In the last few decades, information security has gained huge importance owing to the
massive growth in digital communication; hence, driving steganography to the forefront for …
massive growth in digital communication; hence, driving steganography to the forefront for …
Study and investigation of video steganography over uncompressed and compressed domain: a comprehensive review
In the technological era, the primary source of information is in the form of digital data, which
has to be secured while storing or transmitting during communication over an unsecured …
has to be secured while storing or transmitting during communication over an unsecured …
4D chaotic system-based secure data hiding method to improve robustness and embedding capacity of videos
Chaotic systems are used in various applications due to their high security and complexity.
Because minor changes in parameters have a significant effect on the output values and the …
Because minor changes in parameters have a significant effect on the output values and the …
A new data hiding method based on chaos embedded genetic algorithm for color image
Ş Doğan - Artificial Intelligence Review, 2016 - Springer
Data hiding algorithms, which have many methods describing in the literature, are widely
used in information security. In data hiding applications, optimization techniques are utilized …
used in information security. In data hiding applications, optimization techniques are utilized …
Efficient data hiding method for videos based on adaptive inverted LSB332 and secure frame selection with enhanced Vigenere cipher
In recent years, the importance of information security has increased due to the growth in
digital communication and steganography has come to the fore for secure communication …
digital communication and steganography has come to the fore for secure communication …
An improved hiding information by modifying selected DWT coefficients in video steganography
F Ernawan - Multimedia Tools and Applications, 2024 - Springer
The rapid expansion of information technology enables users to transfer data or files via the
internet in a short time. Steganography is the art of embedding secret information or …
internet in a short time. Steganography is the art of embedding secret information or …
The pixogram: Addressing high payload demands for video steganography
This paper introduces the concept of a pixogram which makes possible a fresh approach to
high payload video steganography. The pixogram allows for a new perspective by …
high payload video steganography. The pixogram allows for a new perspective by …