A multicore-based algorithm for optimal multi-way number partitioning
Abstract The Multi-Way Number Partitioning (MWNP) problem is to divide a multiset of n
numbers into k subsets in such a way that the largest subset sum is minimized. MWNP is an …
numbers into k subsets in such a way that the largest subset sum is minimized. MWNP is an …
A recent approach based on inspired crows behavior in steganography
Nowadays, preventing data transmission via networks from unauthorized access has
become crucial. In this work, we introduce a new enhanced Crow Search Algorithm (CSA) …
become crucial. In this work, we introduce a new enhanced Crow Search Algorithm (CSA) …
[Retracted] Information Steganography Technology of Optical Communication Sensor Network Based on Virtual Reality Technology
ZB Wang, WM Li, GQ Wang - Journal of Sensors, 2022 - Wiley Online Library
In order to solve the problems of narrow object orientation and insufficient visual rendering
ability of the optical communication network experimental system, the author proposes a …
ability of the optical communication network experimental system, the author proposes a …
[PDF][PDF] BUMBLE BEE OPTIMIZATION ALGORITHM BASED OPTIMIZED DATA HIDING FOR IMAGE STEGANOGRAPHY
I Singh, S Kaur - 2022 - irjeas.org
The most important aspect of all forms of confidential communication is security. Although
cryptography can be used to safeguard information, it also reveals the presence of covert …
cryptography can be used to safeguard information, it also reveals the presence of covert …
[PDF][PDF] Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey
Steganography is considered as one of the most important topics in the field of data security.
This is because of the exponential progress and secret communication of prospective …
This is because of the exponential progress and secret communication of prospective …
Propose AI system to enhance image steganography
YTZ Al-Baidhani - 2023 - openaccess.altinbas.edu.tr
Steganography is one of the methods used for the hidden exchange of information and it art
of invisible communication. The confidential communication is concealed so that it cannot be …
of invisible communication. The confidential communication is concealed so that it cannot be …