过去一年中添加的文章,按日期排序

МАТЕМАТИЧЕСКИЕ МОДЕЛИ РИСКА НАРУШЕНИЯ ЦЕЛОСТНОСТИ ДАННЫХ

N Tashatov, A Orazymbetova… - Farg'ona davlat …, 2024 - journal.fdu.uz
9 天前 - … Both traditional and modern approaches to detecting and … algorithms, steganography
and content analysis methods, … This review can be useful both for researchers involved in …

A Study of The Performance of Various Media for Information Security Via LSB Steganography Method for Text Messaging

HV Patil, VP Sonaje - Journal of Electrical Systems, 2024 - search.proquest.com
19 天前 - Video steganography: Video steganography is a process that entails the separation
of a video … algorithms through the implementation of an extraction methodology, as showed …

Steganography through Python: Concealing Secrets in the Least Significant Bit

C Dass, S Tanwar, V Kukreja - Emerging Trends in IoT and …, 2024 - taylorfrancis.com
28 天前 - … of steganography. The study of secret communication is known as steganography.
… We examine the many security and data-hiding methods used to perform steganography in …

[PDF][PDF] A Comprehensive Pattern-based Overview of Stegomalware

F Strachanski, D Petrov, T Schmidbauer… - Proceedings of the …, 2024 - researchgate.net
36 天前 - steganography methods used by the malware are categorized and introduced using
a pattern-based approach. Our survey … 3 introduces our methodology and the results of our …

Coverless Text Information Hiding Techniques: A Review

DA Nasrawi - Journal of Kerbala University, 2024 - mail.journals.uokerbala.edu.iq
37 天前 - … which are challenging to avoid steganalysis. In contrast, coverless … this review is
to examine the most recent findings in the fields of coverless hiding, development approaches, …

[HTML][HTML] Comprehensive Survey on Image Steganalysis Using Deep Learning

NJ De La Croix, T Ahmad, F Han - Array, 2024 - Elsevier
64 天前 - … By examining the latest techniques and methodologies, this work contributes to an
… -based steganalysis, in our comprehensive review, we include a wide range of steganalysis

Customized model for text cryptography using hybrid image-key

Y Khan, S Ahamd, MZ Asghar - Signal, Image and Video Processing, 2024 - Springer
77 天前 - … This study offers a methodology to improve the security of text data during transmission
review begins with an exploration of the historical significance of text steganography

Risk Evaluation and Detection of Information Hidden in Video Container Formats

B Ling, Y Peng, D Hu - 2024 3rd International Conference on …, 2024 - ieeexplore.ieee.org
83 天前 - video steganography attracts considerable attention from researchers. Most video
steganography techniques [… we performed a case study and implemented these methods. The …

Improvised Secure data transfer through the use of steganography for IoT network node data security

V Elakia, M Enush, R Shoba - 2024 International Conference …, 2024 - ieeexplore.ieee.org
91 天前 - … by using steganography and cryptography approaches. When … steganographic
techniques that seek to minimize embedding distortion [8]. This study presents a steganographic

[PDF][PDF] Analysis and Review on Advancement in Steganography Techniques

M Saha, N Barman, A Bhar, N Biswas - ijctjournal.org
96 天前 - … temporal and spatial domains of the video stream. Video steganography is often
used for privacy protection or watermarking. … New approaches and enhancements to GA-based …