Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …
main aspects of early steganography are security, imperceptibility, and payload. Security is …
Image steganography: A review of the recent advances
Image Steganography is the process of hiding information which can be text, image or video
inside a cover image. The secret information is hidden in a way that it not visible to the …
inside a cover image. The secret information is hidden in a way that it not visible to the …
A novel coverless information hiding method based on the average pixel value of the sub-images
In traditional information hiding methods, the secret information is embedded into the
carriers, which will inevitably leave traces of modification on the carriers. In those methods …
carriers, which will inevitably leave traces of modification on the carriers. In those methods …
An image steganography approach based on k-least significant bits (k-LSB)
Image steganography is the operation of hiding a message into a cover image. the message
can be text, codes, or image. Hiding an image into another is the proposed approach in this …
can be text, codes, or image. Hiding an image into another is the proposed approach in this …
Secure robust JPEG steganography based on autoencoder with adaptive BCH encoding
Social networks are everywhere and currently transmitting very large messages. As a result,
transmitting secret messages in such an environment is worth researching. However, the …
transmitting secret messages in such an environment is worth researching. However, the …
[PDF][PDF] Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats
MM Hashim, MSM Rahim, FA Johi… - … of Engineering & …, 2018 - researchgate.net
Recently, Steganography is an outstanding research area which used for data protection
from unauthorized access. Steganography is defined as the art and science of covert …
from unauthorized access. Steganography is defined as the art and science of covert …
A common method of share authentication in image secret sharing
Because of the importance of digital images and their extensive application to digital
watermarking, block chain, access control, identity authentication, distributive storage in the …
watermarking, block chain, access control, identity authentication, distributive storage in the …
[HTML][HTML] Robust data hiding method based on frequency coefficient variance in repetitive compression
Sharing accurate and lossless images with higher quality through digital mediums is
challenging, particularly, images shared on social media platforms can serve as good …
challenging, particularly, images shared on social media platforms can serve as good …
Multiple robustness enhancements for image adaptive steganography in lossy channels
Y Zhang, X Luo, Y Guo, C Qin… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Considering that traditional image steganography technologies suffer from the potential risk
of failure under lossy channels, an enhanced adaptive steganography with multiple …
of failure under lossy channels, an enhanced adaptive steganography with multiple …
Electrically tunable steganographic nano-optical coatings
Thin film coatings with tunable colors have a broad range of applications, from solid-state
reflective displays to steganography. Here, we propose a novel approach to chalcogenide …
reflective displays to steganography. Here, we propose a novel approach to chalcogenide …