Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey of covert communication techniques, limitations and future challenges
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …
while in processing. However, it is not always the optimum choice as attackers know the …
Digital image steganography and steganalysis: A journey of the past three decades
Steganography is the science and art of covert communication. Conversely, steganalysis is
the study of uncovering the steganographic process. The evolution of steganography has …
the study of uncovering the steganographic process. The evolution of steganography has …
Image steganography in spatial domain: A survey
This paper presents a literature review of image steganography techniques in the spatial
domain for last 5 years. The research community has already done lots of noteworthy …
domain for last 5 years. The research community has already done lots of noteworthy …
Secure medical data transmission model for IoT-based healthcare systems
Due to the significant advancement of the Internet of Things (IoT) in the healthcare sector,
the security, and the integrity of the medical data became big challenges for healthcare …
the security, and the integrity of the medical data became big challenges for healthcare …
Secure surveillance framework for IoT systems using probabilistic image encryption
This paper proposes a secure surveillance framework for Internet of things (IoT) systems by
intelligent integration of video summarization and image encryption. First, an efficient video …
intelligent integration of video summarization and image encryption. First, an efficient video …
Secure and robust digital image watermarking using coefficient differencing and chaotic encryption
This paper presents a chaotic encryption-based blind digital image watermarking technique
applicable to both grayscale and color images. Discrete cosine transform (DCT) is used …
applicable to both grayscale and color images. Discrete cosine transform (DCT) is used …
Dynamic improved pixel value ordering reversible data hiding
The existing reversible data hiding (RDH) methods based on improved pixel value ordering
(IPVO) use only a small portion of the pixels (eg, at most six pixels) in a block for embedding …
(IPVO) use only a small portion of the pixels (eg, at most six pixels) in a block for embedding …
CNN-based anti-spoofing two-tier multi-factor authentication system
Many hybrid and multimodal biometric recognition techniques have been presented to
provide secure and authentic systems, incorporating both soft and hard biometric schemes …
provide secure and authentic systems, incorporating both soft and hard biometric schemes …
A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC
Over the past few decades, the art of secretly embedding and communicating digital data
has gained enormous attention because of the technological development in both digital …
has gained enormous attention because of the technological development in both digital …
Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications
Multimedia communication is revolutionizing all major spheres of human life. The advent of
IoT and its applications in many fields like sensing, healthcare and industry, result …
IoT and its applications in many fields like sensing, healthcare and industry, result …