[PDF][PDF] Image Steganography Using CNN

R Raj, A Gupta, SG Shanmugam - 2023 - easychair.org
The main factors that led me to choose steganography from the list of potential project ideas
were my lack of acquaintance with it and my interest in it. It also guarantees data security …

Crypto and AI

After some introductory discussions in Sect. 1.1, this chapter studies the role of AI in the
ecosystem of cryptography (Sect. 1.2). The chapter proceeds to study the role of …

A new approach to solve the reliability problem in any VoIP steganography system

MR Sadeghi, P Amirzade Dana… - AUT Journal of …, 2022 - ajmc.aut.ac.ir
VoIP is naturally an unreliable communication system. Thus, using the best VoIP
steganographic systems, the accuracy of the hidden message is impaired as a result of the …

ВЕСТНИК КОМПЬЮТЕРНЫХ И ИНФОРМАЦИОННЫХ ТЕХНОЛОГИЙ

ЕЮ ЩЕТИНИН - ВЕСТНИК КОМПЬЮТЕРНЫХ И …, 2022 - elibrary.ru
Предложен метод обнаружения аномалий в электрокардиограммах на основе
различных моделей автоматических кодировщиков. Компьютерные эксперименты по …

[PDF][PDF] Pragmatic analysis of ECC based security models from an empirical perspective

N Purohit, S Joshi, M Pande, S Lincke - … .s3.ap-south-1.amazonaws.com
This paper provides a detailed discussion about currently proposed Elliptic Curve
Cryptography (ECC) models focusing on performance parameters such as Security …

Image Steganography: Recent Trends and Techniques

RV Ravi, B Abd El-Rahiem, MM Ghonge - … Approach to Modern …, 2021 - igi-global.com
Steganography is the process used hide the existence of information during transmission.
Cover mediums like text, image, audio, and video protocols are used to hide the secret …

[PDF][PDF] Using a Clustering Algorithm and a Transform Function, Identify Forged Images

S Bokefode, J Sarwade, K Sakure, S Bankar, S Janrao… - irjms.com
In the realm of digital multimedia analysis, combating picture fraud stands as a critical
endeavor, given the prevalence of manipulation facilitated by contemporary multimedia …

Enhancing Data Hiding with Deep Steganography: Leveraging CNNs and Loss Function Optimization for Robustness and Quality

M Pa, GK Ta - papers.ssrn.com
Data hiding techniques in recent years have utilized CNNs (Convolutional Neural
Networks), particularly Deep Steganography techniques, which are extremely popular in the …

[PDF][PDF] An analytical survey on the role of image cryptography and related computational methods

V Ranjan, K Patidar, R Kushwaha - International Journal of …, 2020 - academia.edu
In the current scenario data security is an important and crucial aspects. It is crucial in terms
of different domains and application areas like banking, enterprises, educational institutes …

[引用][C] Analisis Daya Tahan Keamanan Data Pada Steganografi Berbasis Teks Dalam Struktur Kalimat Bahasa Indonesia

RFSSP Nusantara - unit03.trigunadharma.ac.id
Data security in text-based steganography needs to be analyzed in depth to ensure the
sustainability and security of the method. The purpose of this research is to analyze the …