Image steganography based on artificial immune in mobile edge computing with internet of things

X Ding, Y Xie, P Li, M Cui, J Chen - IEEE Access, 2020 - ieeexplore.ieee.org
Mobile edge computing provides high computing power, data storage capacity and
bandwidth requirements for Internet of Things (IoT) through edge servers that process data …

Multi-image hiding blind robust RGB steganography in transform domain

D Debnath, E Ghosh, BG Banik - International Journal of Web-Based …, 2020 - igi-global.com
Steganography is a widely-used technique for digital data hiding. Image steganography is
the most popular among all other kinds of steganography. In this article, a novel key-based …

Hidden data transmission during organizations interaction

AV Nikishova, MY Umnitsyn… - 2019 International Multi …, 2019 - ieeexplore.ieee.org
Data is a valuable resource. So it should be protected. The most vulnerable action on the
data is its transmission. Common approach to data protection during its transmission is …

Review on Image Steganography Transform Domain Techniques

G Gnanitha, A Swetha, G Sai Teja, D Sri Vasavi… - … of Innovative Product …, 2022 - Springer
In today's society, data security is of the utmost importance. Securing data by ensuring
confidentiality and integrity is crucial. Security of information is essential for transferring …

[PDF][PDF] JOURNAL OF NORTHEASTERN UNIVERSITY

DS Bhosale, M Dhobley - Journal of Northeastern University, 2022 - dbdxxb.cn
A fictional non-human character that personifies a brand's beliefs and traits is known as its
mascot. Mascots are capable of doing more than just giving business a moniker …

Secure End to End transmission using Audio Steganography and AES encryption

AC Gautam - 2019 - norma.ncirl.ie
Steganography refers to data or a document hidden in a digital image, video or audio file. If
a person perceives the files in which the data is stored inside, there will be no evidence that …

Imperceptible Improvement of Secure Image Steganography based on Wavelet Transform and OTP Encryption using PN Generator

A Setyono - Journal of Physics: Conference Series, 2019 - iopscience.iop.org
Digital data is widely transacted through internet media that can be accessed publicly, so
this requires security of the data. This research proposes a combination of steganography …

[引用][C] A generalization of Arnolds CAT map and fraction based embedding in image steganography

MMM Buker - 2019 - platform.almanhal.com
منصة المنهل لقد انتهت الجلسة. يرجى العمل على إعادة تحديث الصفحة إعادة تحديث يرجى الانتظار...
يتم تحضير الملف الاستخدام المجاني إذا كنت ترغب في الوصول الكامل إلى هذا المحتوى وقاعدة …