Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …
main aspects of early steganography are security, imperceptibility, and payload. Security is …
A comprehensive survey of covert communication techniques, limitations and future challenges
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …
while in processing. However, it is not always the optimum choice as attackers know the …
Image steganography in spatial domain: A survey
This paper presents a literature review of image steganography techniques in the spatial
domain for last 5 years. The research community has already done lots of noteworthy …
domain for last 5 years. The research community has already done lots of noteworthy …
Efficient deep CNN-based fire detection and localization in video surveillance applications
Convolutional neural networks (CNNs) have yielded state-of-the-art performance in image
classification and other computer vision tasks. Their application in fire detection systems will …
classification and other computer vision tasks. Their application in fire detection systems will …
Early fire detection using convolutional neural networks during surveillance for effective disaster management
Fire disasters are man-made disasters, which cause ecological, social, and economic
damage. To minimize these losses, early detection of fire and an autonomous response are …
damage. To minimize these losses, early detection of fire and an autonomous response are …
A new payload partition strategy in color image steganography
In traditional steganographic schemes, RGB three channels payloads are assigned equally
in a true color image. In fact, the security of color image steganography relates not only to …
in a true color image. In fact, the security of color image steganography relates not only to …
A hybrid model of internet of things and cloud computing to manage big data in health services applications
Over the last decade, there has been an increasing interest in big data research, especially
for health services applications. The adoption of the cloud computing and the Internet of …
for health services applications. The adoption of the cloud computing and the Internet of …
Secure surveillance framework for IoT systems using probabilistic image encryption
This paper proposes a secure surveillance framework for Internet of things (IoT) systems by
intelligent integration of video summarization and image encryption. First, an efficient video …
intelligent integration of video summarization and image encryption. First, an efficient video …
Secure and robust fragile watermarking scheme for medical images
Due to the advances in computer-based communication and health services over the past
decade, the need for image security becomes urgent to address the requirements of both …
decade, the need for image security becomes urgent to address the requirements of both …
A privacy-preserving cryptosystem for IoT E-healthcare
Privacy preservation has become a prerequisite for modern applications in the cloud, social
media, Internet of things (IoT), and E-healthcare systems. In general, health and medical …
media, Internet of things (IoT), and E-healthcare systems. In general, health and medical …