过去一年中添加的文章,按日期排序

Methodologies in Steganography and Cryptography–Review

GK Murhty, T Kanimozhi - Modern Approaches in Machine Learning and …, 2024 - Springer
168 天前 - … ” author suggested a securing text- and audio-steganographic communication
utilizing an image-steganographic technique provides text and audio data security in a single …

[图书][B] Frontiers in Cyber Security: 6th International Conference, FCS 2023, Chengdu, China, August 21–23, 2023, Revised Selected Papers

H Yang, R Lu - 2024 - books.google.com
178 天前 - … While the focus is on publication of peer-reviewed full papers presenting mature
work, inclusion of reviewed short papers reporting on work in progress is welcome, too. …

[引用][C] Message from the General Chairs of WIFS 2023

M Gomez-Barrero, C Riess - ieeexplore.ieee.org
179 天前 - … The review process was managed by the three Program Chairs, Irene Amerini, Patrick
… aspects of biometric recognition, steganography and steganalysis, audio forensics, deep …

[PDF][PDF] Comprehensive on Exploring Advanced Ciphering for Enhanced Data Protection

NAM Ali, SG Mohammed, FG Mohammed… - Wasit Journal for Pure …, 2023 - iasj.net
182 天前 - … This review provides a comprehensive analysis of current approaches, including
their … (eg, DCT, DWT), This paper examines transform domain steganography techniques, …

[PDF][PDF] Review on various image protection methods

EG Abdulkadhim, SH Dhahi, MS Al-Shemarry - Journal of Al-Qadisiyah for …, 2023 - iasj.net
182 天前 - … As mentioned earlier, the basis of steganography is to … an MSB-based image
steganography technique has been … , various steganography and cryptographic were reviewed in …

Image Compression and Decompression based on FFT algorithm

S Karmakar, M Mondal, D Roy, S Mitra… - … Engineering & Nano …, 2023 - ieeexplore.ieee.org
194 天前 - … The literature on rapid Fourier transform image compression is reviewed in this
work. The fundamentals of Fourier and rapid Fourier transforms, as well as picture compression, …

Blockchain Technology in Document Authentication: A Comprehensive Literature Review

BA Usha, S Monish, MMH AS, N Kumar… - … and Industry 6.0 …, 2023 - ieeexplore.ieee.org
197 天前 - … This review explores the influence of blockchain … steganography for secure
certificate management. The simulation extensively evaluates the efficacy of four steganography

Steganography Techniques a Review

N Saxena, H Kumar - 2023 5th International Conference on …, 2023 - ieeexplore.ieee.org
197 天前 - … current developments in steganography methods. The purpose of this review article
is to undertake acomparative examination of all of the available steganography methods in …

[图书][B] Dictionary of Mechanical Engineering

DK Singh - 2024 - Springer
203 天前 - I would like to express my sincere thanks to many people who have helped in the
publication of this book. First and foremost, my family, who were always supportive of my work …

Converging Encryption, Hashing and Steganography for Data Fortification

D Vora, H Ubhare, Y Chheda… - 2023 6th International …, 2023 - ieeexplore.ieee.org
204 天前 - … with flip and rotational LSB (Least Significant Bit) steganography techniques to
ensure secure data transmission and covert concealment within digital images This integrated …