Application of integrated steganography and image compressing techniques for confidential information transmission

BK Pandey, D Pandey, S Wairya… - Cyber security and …, 2022 - Wiley Online Library
In the present day, images and videos account for nearly 80% of all the data transmitted
during our daily activities. This work employs a combination of novel stegnography and data …

Effective and secure transmission of health information using advanced morphological component analysis and image hiding

BK Pandey, D Pandey, VK Nassa, S George… - Artificial Intelligence on …, 2022 - Springer
The using morphological component analysis, deep learning, and steganography, this study
examines the secure transmission, identification, and validation of textual pictures via this …

Investigating role of iot in the development of smart application for security enhancement

JK Pandey, R Jain, R Dilip, M Kumbhkar… - IoT Based Smart …, 2022 - Springer
IoT solutions enable customers to automate, analyze, and integrate their systems to a
greater extent. They broaden the breadth and accuracy of these fields. The Internet of Things …

A novel approach for linguistic steganography evaluation based on artificial neural networks

R Gurunath, AH Alahmadi, D Samanta, MZ Khan… - IEEE …, 2021 - ieeexplore.ieee.org
Increasing prevalence and simplicity of using Artificial Intelligence (AI) techniques,
Steganography is shifting from conventional model building to AI model building. AI enables …

[PDF][PDF] High PSNR Using Fibonacci Sequences in Classical Cryptography and Steganography Using LSB.

CA Sari, MH Dzaki, EH Rachmawanto, RR Ali… - International Journal of …, 2023 - inass.org
The exchange of confidential information should be done in a secure environment.
Therefore, security is needed if the exchange of information is carried out using Internet …

Social media and steganography: use, risks and current status

R Gurunath, MFJ Klaib, D Samanta, MZ Khan - Ieee Access, 2021 - ieeexplore.ieee.org
Steganography or data hiding is used to protect the privacy of information in the transit; it has
been observed that the information that flows through Online Social Networks (OSN) is very …

Insights Into Deep Steganography: A Study of Steganography Automation and Trends

R Gurunath, D Samanta… - Cyber Security and …, 2022 - Wiley Online Library
Recurrent neural networks (RNNs) are built on the foundation of feed forward networks. The
greatest comparison for RNN is simple writing analysis, where the prediction of the next …

Agriculture using Smart Sensors

AK Saxena, R Kumar, V Srikanth… - … in Agriculture: Tools …, 2024 - books.google.com
The people's most basic and important employment is agriculture. Urbanization poses a
newer issues and causes a bulk exodus of village residents to the metropolitan as a result of …

[PDF][PDF] A New Approach for Image Steganography Using Inter Pixel Value Difference and Quantized Range Table Method

M Naz, S Zade - Int. J. Sci. Res. Eng. Trends, 2022 - ijsret.com
In the time of data, secret communication is quite possibly the main issues in the present
communication framework. The improvement of computerized communication with …

A Novel Algorithm to Detect and Transmit Human-Directed Signboard Image Text to Vehicle Using 5G-Enabled Wireless Networks

D Pandey, S Wairya - International Journal of Distributed Artificial …, 2022 - igi-global.com
The emerging 5G telecommunication technology uses novel aspects to fulfill the challenges
of high data rate, ultra-low latency, broad bandwidth with the best user experience for text …