过去一年中添加的文章,按日期排序

[HTML][HTML] Hidden in Plain Sight: AI-Driven Steganography and Watermarking for Secure Transmission of Ophthalmic Data

M Balas, C Rudnisky, EB Ing - AJO International, 2024 - Elsevier
9 天前 - … of steganographic and watermarking techniques in ophthalmic data security. The
study reviews … Subtle modifications introduced by steganographic techniques, while generally …

[PDF][PDF] A novel Text Steganography using font color after data compression

M Askari, A Mahmood - researchgate.net
19 天前 - … 1) To review the Steganography mechanism (2) To review … Lots of Research done
so far and many techniques being … In our novel text steganography technique both high data …

Survey on Improvement in Efficiency of Steganography

MC Jeeva, P Nijin, SA Kumar… - Next-Gen Technologies …, 2024 - books.google.com
28 天前 - … a review of recent advances in steganography and … This paper proposes that
Steganography is the technique of … In this research, we provide a steganographic technique for …

Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-based Cryptography, and Chaotic Cryptography Techniques

AA Pekerti, A Sasongko, A Indrayanto - IEEE Access, 2024 - ieeexplore.ieee.org
33 天前 - … Furthermore, this paper focuses its coverage to steganography techniques, and
does not include cryptography as part of the communication security techniques discussed. …

Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles

G Ali, MM Mijwil - Mesopotamian Journal of …, 2024 - journals.mesopotamian.press
34 天前 - … This review paper offers a comprehensive evaluation of … -based techniques, digital
watermarking, digital steganography, … This review aims to inform policymakers, healthcare …

Enhancement of L. Voleti LSB technique applied to Image Steganography

RGA Mendoza, MRC Antonio, RM Dioses… - … Research and Reviews, 2024 - wjarr.com
38 天前 - … by combining steganography and cryptography techniques. Steganography, which
… The research delves into combinations of algorithms that integrate steganography and …

[图书][B] Control and Information Sciences: Select Proceedings of CISCON 2022

VI George - 2024 - books.google.com
39 天前 - … 100 publications in peer-reviewed journals and delivered several technical talks.
He is serving as a reviewer and editorial board member for several peer-reviewed journals. …

[PDF][PDF] Analysis and Review on Advancement in Steganography Techniques

M Saha, N Barman, A Bhar, N Biswas - ijctjournal.org
53 天前 - … of steganography, a technique that hides sensitive information within seemingly
ordinary digital content. Steganography … The primary purpose of steganography is to facilitate …

[图书][B] Digital Forensics and Watermarking: 22nd International Workshop, IWDW 2023, Jinan, China, November 25-26, 2023, Revised Selected Papers

B Ma, J Li, Q Li - 2024 - books.google.com
60 天前 - … The 22 full papers included in this book were carefully reviewed and selected from
48 submissions. The workshop focuses on subjects such as novel research, development …

Investigating the Effectiveness of Artificial Intelligence in Watermarking and Steganography for Digital Media Security

SMJ Abdalwahid, WA Hashim… - … Multi-Conference on …, 2024 - ieeexplore.ieee.org
65 天前 - … This review of article addresses the issue by … modern steganography techniques
that encode the maximum msg bits within edge pixels by using edge detection. The technique