密文域可逆信息隐藏综述

柯彦, 张敏情, 刘佳, 杨晓元 - 计算机应用, 2016 - joca.cn
可逆信息隐藏是信息隐藏技术的新兴研究方向, 密文域可逆信息隐藏作为加密域信号处理技术与
信息隐藏技术的重要结合点, 对于数据处理过程中的信息安全可以起到双重保险的作用 …

Quantum Steganography Using Two Hidden Thresholds.

AG Tudorache, V Manta… - Advances in Electrical & …, 2021 - search.ebscohost.com
This paper describes a novel steganography algorithm that combines quantum computing
with the least significant bit technique (LSB). Using the quantum properties, along with the …

Artificial immune recognition system-based classification technique

KB Bahekar, AK Gupta - … on Recent Advancement on Computer and …, 2018 - Springer
Nowadays, data mining methods are being applied in the field of knowledge generation,
which helps in decision making and intersects many disciplines of computer science such as …

Reversible Data Hiding Algorithm for Binary Image Based on Sliding Window

F Ren, Q Li, Y Liu, X Wang - Proceedings of the 2022 5th International …, 2022 - dl.acm.org
Since binary images are only black and white, it is prone to produce visual distortion when
embedding data. And due to the two modes of binary images, the image can store less …

A New Symmetric Information Hiding Scheme Based on Cover Randomness

F Ren, M Yu, H Xiu, W Hou - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
This paper proposes a new symmetric information hiding scheme, aiming to increase the
degree of disguise and the security. This scheme utilizes the randomness of the image cover …

Comprehensive Analysis of Classification Techniques Based on Artificial Immune System and Artificial Neural Network Algorithms

KB Bahekar - Applications of Artificial Intelligence in Engineering …, 2021 - Springer
Abstract Knowledge mining from large voluminous data, ie, big data is a difficult and
important task nowadays; new techniques are required to be implemented in the field of data …

Privacy of Patient Information: Implementation and Security Analysis of a Secure Three Tier Patient Information System Based on QR Code

N Panwar, MS Rauthan… - … Conference on Micro …, 2016 - ieeexplore.ieee.org
In the era of technology data security and information sharing is always a hot topic to talk on.
There are lot of methods that are being used in security for secret information sharing such …

[PDF][PDF] An Improved Secure Image Transmission Technique via Mosaic Images by Nearly Reversible Color Transformations.

FA Buenano, GFO Cifuentes, I Mora-Jiménez… - SIGMAP, 2017 - scitepress.org
Current multimedia communication systems seek to transmit images supporting contents by
the data stream, which requires specific effort for their bandwidth optimization. In this …