过去一年中添加的文章,按日期排序

Unveiling the Invisible an In-Depth Analysis of Text Steganography Techniques, Challenges, and Advancement

LK Tyagi, A Gupta, A Mohamed - 2023 3rd International …, 2023 - ieeexplore.ieee.org
241 天前 - … This work provides a comprehensive review of the most recent results in text
steganography, including a variety of approaches, challenges, and possible directions for further …

Stegomalware: A Systematic Survey of Malware Hiding and Detection in Images, Machine Learning Models and Research Challenges

M Alazab, T Pham - Authorea Preprints, 2023 - techrxiv.org
243 天前 - … Based on our findings, we perform the detail review of the image steganography
techniques including the recent Generative Adversarial Networks (GAN) based models and the …

Video Steganography Techniques: A Comprehensive Review and Performance Evaluation

H Kumar, P Mamoria, S Kumari, MK Misra - International Conference on …, 2023 - Springer
246 天前 - … discusses various steganography techniques and their parameters. Based on these
parameters, we make some comparative analysis among different steganography methods …

Information Security: A Review on Steganography with Cryptography for Genetic Algorithm (GA) Transaction

SA Shawkat, N Tagougui… - 2023 7th International …, 2023 - ieeexplore.ieee.org
247 天前 - … The majority of steganographic techniques used currently use image or audio
files for hiding data [7]. The information that has to be hidden is spread out among the least …

A Survey on DNA-Based Cryptography and Steganography

T Mahjabin, A Olteanu, Y Xiao, W Han, T Li… - IEEE Access, 2023 - ieeexplore.ieee.org
257 天前 - … of different techniques for DNA-based cryptography and steganography. We review
three types … Section V outlines DNA-based steganography techniques involving DNA as an …

[PDF][PDF] A Review on Steganography Techniques

P Thakur, MT Scholar, SB MP - academia.edu
259 天前 - … various steganography techniques with its Steganalysis. It states a bunch of criteria
to examine and calculate the strengths and weaknesses of the earlier presented techniques

[图书][B] Methods and Applications for Modeling and Simulation of Complex Systems: 22nd Asia Simulation Conference, AsiaSim 2023, Langkawi, Malaysia, October 25 …

F Hassan, N Sunar, MAM Basri, MSA Mahmud… - 2023 - books.google.com
261 天前 - … full papers presenting mature work, inclusion of reviewed short papers reporting on
work … domains where steganography could be used [5]. Steganographic techniques modify …

A Review on Garlic Routing and Artificial Intelligence Applications in Public Network

S Maalavika, G Thangavel… - … Conference on Computer …, 2023 - ieeexplore.ieee.org
263 天前 - … Future researchers can improve encryption methods, steganography techniques,
and other security algorithms by using AI-based Garlic routing. The result comparison table …

A Walk-through towards network steganography techniques

U Pilania, M Kumar, T Rohit, N Nandal - Информатика и …, 2023 - ia.spcras.ru
278 天前 - review can help researchers to understand the existing trends in network steganography
techniques to … Many papers have been reviewed in this section based on the reference …

The Design Review of Feature-based Method in Embedding the Hidden Message in Text as the Implementation of Steganography

R Din, S Utama - Borneo International Journal eISSN 2636-9826, 2023 - majmuah.com
278 天前 - … conducts a review of several techniques of featurebased text steganography that
concern … refers to the categorization and organization of steganographic techniques based on …