Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic literature review on chaotic maps-based image security techniques
Images play a substantial role in various applications such as medical imaging, satellite
imaging, and military communications. These images often contain confidential and …
imaging, and military communications. These images often contain confidential and …
[PDF][PDF] A REVIEW AND OPEN ISSUES OF MULTIFARIOUS IMAGE STEGANOGRAPHY TECHNIQUES IN SPATIAL DOMAIN.
M Hashim, MS MOHD RAHIM… - Journal of Theoretical & …, 2018 - researchgate.net
Nowadays, information hiding is becoming a helpful technique and fetch more attention due
fast growth of using internet, it is applied for sending secret information by using different …
fast growth of using internet, it is applied for sending secret information by using different …
A steganography embedding method based on edge identification and XOR coding
H Al-Dmour, A Al-Ani - Expert systems with Applications, 2016 - Elsevier
In this paper, we present a novel image steganography algorithm that combines the
strengths of edge detection and XOR coding, to conceal a secret message either in the …
strengths of edge detection and XOR coding, to conceal a secret message either in the …
[PDF][PDF] Image steganography using least significant bit and secret map techniques.
A ALabaichi, MAAK Al-Dabbas… - International journal of …, 2020 - researchgate.net
In steganography, secret data are invisible in cover media, such as text, audio, video and
image. Hence, attackers have no knowledge of the original message contained in the media …
image. Hence, attackers have no knowledge of the original message contained in the media …
[PDF][PDF] Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats
MM Hashim, MSM Rahim, FA Johi… - … of Engineering & …, 2018 - researchgate.net
Recently, Steganography is an outstanding research area which used for data protection
from unauthorized access. Steganography is defined as the art and science of covert …
from unauthorized access. Steganography is defined as the art and science of covert …
Indirect Steganographic Embedding Method Based On Modifications of The Basis of the Polyadic System
Develloped a new approach of indirect steganographic embedding of data based on
modifications of the basis of the polyadic system. In comparison with other methods indirect …
modifications of the basis of the polyadic system. In comparison with other methods indirect …
Secure and low-complexity medical image exchange based on compressive sensing and lsb audio steganography
Patients' data constitutes the vast majority of information exchanged over the Internet. The
magnitude of maintaining its security and privacy directly correlates to the importance and …
magnitude of maintaining its security and privacy directly correlates to the importance and …
High security data hiding using image crop** and LSB least significant bit steganography
KA Al-Afandy, OS Faragallah… - 2016 4th IEEE …, 2016 - ieeexplore.ieee.org
A high security data hiding approach using image crop** and Least Significant Bit (LSB)
steganography is proposed. The predefined certain secret coordinate crops are extracted …
steganography is proposed. The predefined certain secret coordinate crops are extracted …
Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid
This paper introduces a high capacity image hiding scheme with enhanced stego image
quality. This new hiding scheme utilizes a multiscale Laplacian pyramid of the cover image …
quality. This new hiding scheme utilizes a multiscale Laplacian pyramid of the cover image …
A novel method for digital image steganography based on a new three-dimensional chaotic map
This paper, presents a novel chaos-based image steganography algorithm. Because of
efficient property of chaos based security systems besides steganography applicability in …
efficient property of chaos based security systems besides steganography applicability in …