M Alazab, T Pham - Authorea Preprints, 2023 - techrxiv.org
243 天前 - … Based on our findings, we perform the detail review of the image steganography techniques including the recent Generative Adversarial Networks (GAN) based models and the …
H Kumar, P Mamoria, S Kumari, MK Misra - International Conference on …, 2023 - Springer
246 天前 - … discusses various steganographytechniques and their parameters. Based on these parameters, we make some comparative analysis among different steganography methods …
247 天前 - … The majority of steganographictechniques used currently use image or audio files for hiding data [7]. The information that has to be hidden is spread out among the least …
257 天前 - … of different techniques for DNA-based cryptography and steganography. We review three types … Section V outlines DNA-based steganographytechniques involving DNA as an …
259 天前 - … various steganographytechniques with its Steganalysis. It states a bunch of criteria to examine and calculate the strengths and weaknesses of the earlier presented techniques…
261 天前 - … full papers presenting mature work, inclusion of reviewed short papers reporting on work … domains where steganography could be used [5]. Steganographictechniques modify …
S Maalavika, G Thangavel… - … Conference on Computer …, 2023 - ieeexplore.ieee.org
263 天前 - … Future researchers can improve encryption methods, steganographytechniques, and other security algorithms by using AI-based Garlic routing. The result comparison table …
278 天前 - … review can help researchers to understand the existing trends in network steganography techniques to … Many papers have been reviewed in this section based on the reference …
R Din, S Utama - Borneo International Journal eISSN 2636-9826, 2023 - majmuah.com
278 天前 - … conducts a review of several techniques of featurebased text steganography that concern … refers to the categorization and organization of steganographictechniques based on …