[HTML][HTML] Improved chaos-based video steganography using DNA alphabets
DNA based steganography plays a vital role in the field of privacy and secure
communication. Here, we propose a DNA properties-based mechanism to send data hidden …
communication. Here, we propose a DNA properties-based mechanism to send data hidden …
An exploration analysis of social media security
Social media security is a rising concern among today's generation, as when the pandemic
started, a lot more people than before have begun using social media due to lack of …
started, a lot more people than before have begun using social media due to lack of …
Securing voice communications using audio steganography
A Phipps, K Ouazzane… - … Journal of Computer …, 2022 - repository.londonmet.ac.uk
Although authentication of users of digital voice-based systems has been addressed by
much research and many commercially available products, there are very few that perform …
much research and many commercially available products, there are very few that perform …
Robust detection for object removal with post-processing by exemplar-based image inpainting
Exemplar-based image inpainting can be maliciously used for object removal forgery
without leaving any perceptual clues. Especially, post-processing might further brings …
without leaving any perceptual clues. Especially, post-processing might further brings …
[PDF][PDF] Image Processing and AES for Secure Communications
A Hamdy - Bachelor Thesis, The German University in Cairo, 2021 - researchgate.net
Abstract Information security has become an important matter in recent decades. Multimedia
applications have been growing exponentially and researches are becoming more …
applications have been growing exponentially and researches are becoming more …
An improved reversible data hiding scheme based on pixel permutation
J Wang, X Sun, X Feng - International Journal of Information …, 2019 - inderscienceonline.com
Low payload capacity is a flaw in pixel exchange-based reversible data hiding schemes. In
order to improve it, this paper proposes a triangular pixel pair structure, which requires fewer …
order to improve it, this paper proposes a triangular pixel pair structure, which requires fewer …
[ספר][B] System Steganalysis: Implementation Vulnerabilities and Side-Channel Attacks Against Digital Steganography Systems
T Sloan - 2018 - search.proquest.com
Steganography is the process of hiding information in plain sight, it is a technology that can
be used to hide data and facilitate secret communications. Steganography is commonly …
be used to hide data and facilitate secret communications. Steganography is commonly …
Spatial Domain Image Steganography Based on Right Most Digit Replacement and Parity Bit Differencing
M Hussain - 2017 - search.proquest.com
The rapid advancement in digital computation, communication and exponential proliferation
of the Internet has now become the easiest and economical way of data transmission. This …
of the Internet has now become the easiest and economical way of data transmission. This …
Spatial domain image steganography based on right most digit replacement and parity bit differencing/Mehdi Hussain
H Mehdi - 2017 - studentsrepo.um.edu.my
The rapid advancement in digital computation, communication and exponential proliferation
of the Internet has now become the easiest and economical way of data transmission. This …
of the Internet has now become the easiest and economical way of data transmission. This …