An image steganography scheme based on ResNet

L Liu, L Meng, X Wang, Y Peng - Multimedia Tools and Applications, 2022 - Springer
In recent years, deep learning has been used in steganography scheme, and the
implemented solution had a large hidden capacity. In order to further study the effect of basic …

Application of machine learning in intelligent encryption for digital information of real-time image text under big data

L Liu, M Gao, Y Zhang, Y Wang - EURASIP Journal on Wireless …, 2022 - Springer
In the context of big data, the exploration of the application effect of machine learning in
intelligent encryption for real-time image text digital information aims to improve the privacy …

High‐Capacity Image Steganography Algorithm Based on Image Style Transfer

X Bi, X Yang, C Wang, J Liu - Security and Communication …, 2021 - Wiley Online Library
Steganography is a technique for publicly transmitting secret information through a cover.
Most of the existing steganography algorithms are based on modifying the cover image …

[PDF][PDF] A combination of least significant bit and deflate compression for image steganography

HK Tayyeh, ASA Al-Jumaili - International Journal of Electrical and …, 2022 - academia.edu
Steganography is one of the cryptography techniques where secret information can be
hidden through multimedia files such as images and videos. Steganography can offer a way …

Pencil shell matrix based image steganography with elevated embedding capacity

S Mukherjee, S Sarkar, S Mukhopadhyay - Journal of Information Security …, 2021 - Elsevier
Image steganography is a mechanism that imperceptibly conceals information in a cover
image while also enabling the concealed details to be reliably retrieved from that image. The …

[PDF][PDF] Dwt-svd based image steganography using threshold value encryption method.

J Khandelwal, VK Sharma, D Singh… - Computers, Materials & …, 2022 - cdn.techscience.cn
Digital image steganography technique based on hiding the secret data behind of cover
image in such a way that it is not detected by the human visual system. This paper presents …

A security-enhanced and privacy-preserving certificateless aggregate signcryption scheme-based artificial neural network in wireless medical sensor network

R Ren, J Su - IEEE Sensors Journal, 2023 - ieeexplore.ieee.org
With the recent advances in mobile sensing and beyond-5G technologies, wireless medical
sensor networks (WMSNs) have become an emerging hot topic in smart healthcare. Under …

A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system

AA Mawgoud, MHN Taha, A Abu-Talleb… - Journal of Cloud …, 2022 - Springer
In the early days of digital transformation, the automation, scalability, and availability of cloud
computing made a big difference for business. Nonetheless, significant concerns have been …

Unseen to Seen by Digital Steganography: Modern-Day Data-Hiding Techniques

SK Bandyopadhyay, V Goyal, S Dutta… - … Approach to Modern …, 2021 - igi-global.com
In this digital era, most of the daily works of users are captured in digital forms like image,
audio, video, or even text. These may contain sensitive, confidential, or private information …

Secure and privacy in healthcare data using quaternion based neural network and encoder-elliptic curve deep neural network with blockchain on the cloud …

P Suganthi, R Kavitha - Sādhanā, 2023 - Springer
The security and privacy of healthcare data are crucial aspects within the healthcare
industry, as accurate diagnoses rely on medical professionals accessing patient healthcare …