Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Image watermarking between conventional and learning-based techniques: a literature review
Currently, most transactions and exchanges are conducted through the Internet thanks to
technological tools, running the risk of the falsification and distortion of information. This is …
technological tools, running the risk of the falsification and distortion of information. This is …
[PDF][PDF] An enhanced LSB-image steganography using the hybrid Canny-Sobel edge detection
J Jumanto - Cybernetics and information technologies, 2018 - sciendo.com
The Internet is a public network with many issues of data transfer security. Steganography is
a data transmission security technique that is done by hiding the message in a container …
a data transmission security technique that is done by hiding the message in a container …
An imperceptible LSB image hiding on edge region using DES encryption
Sending image in a plain form has a high risk for the data being vulnerable to steal. Thus,
due to reducing the risk, data security techniques should be implemented. Data security …
due to reducing the risk, data security techniques should be implemented. Data security …
A good performance OTP encryption image based on DCT-DWT steganography
The security aspect is very important in data transmission. One way to secure data is with
steganography and cryptography. Surely research on this should continue to be developed …
steganography and cryptography. Surely research on this should continue to be developed …
A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size
Many people have used the internet in daily communication. The rise of internet data theft
makes the security of data transmission becomes very important. Cryptography and …
makes the security of data transmission becomes very important. Cryptography and …
Hiding and securing message on edge areas of image using LSB steganography and OTP encryption
Imperceptibility and security are the two most important things in StegoCrypt techniques. In
this paper, we have proposed the technique of inserting messages to the edge of the image …
this paper, we have proposed the technique of inserting messages to the edge of the image …
Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm
G Ardiansyah, CA Sari… - 2017 2nd International …, 2017 - ieeexplore.ieee.org
Public networks such as the Internet are becoming more sophisticated, faster, and cheaper,
so that more and more used for information exchange. This may increase the likelihood of …
so that more and more used for information exchange. This may increase the likelihood of …
A secure image watermarking using Chinese remainder theorem based on haar wavelet transform
U Sudibyo, F Eranisa… - 2017 4th International …, 2017 - ieeexplore.ieee.org
This study proposed concealment of information through watermarking techniques using a
combination of Haar Wavelet Transform (HWT) and Chinese Remainder Theorem (CRT) …
combination of Haar Wavelet Transform (HWT) and Chinese Remainder Theorem (CRT) …
Image watermarking using low wavelet subband based on 8× 8 sub-block DCT
Currently, digital image watermarking is widely implemented as a tool for copyright
protection. Along with technological developments, the technique of theft and manipulation …
protection. Along with technological developments, the technique of theft and manipulation …
StegoCrypt method using wavelet transform and one-time pad for secret image delivery
A Setyono - 2017 4th International Conference on …, 2017 - ieeexplore.ieee.org
In this study, the StegoCrypt technique is proposed using a combination of Discrete Wavelet
Transform (DWT) and One-Time Pad (OTP). Cover image with size 512∗ 512 transformed …
Transform (DWT) and One-Time Pad (OTP). Cover image with size 512∗ 512 transformed …