Big data architecture for network security

B Bansal, VN Jenipher, R Jain, R Dilip… - Cyber Security and …, 2022 - Wiley Online Library
Research is considering security of big data and retaining the performance during its
transmission over network. It has been observed that there have been several researches …

An adaptive image steganography approach depending on integer wavelet transform and genetic algorithm

S Pramanik - Multimedia Tools and Applications, 2023 - Springer
Steganography is the art and a science of obscuring the presence of communication by
hiding content in electronic media and so obscuring the presence of communication from the …

Application of integrated steganography and image compressing techniques for confidential information transmission

BK Pandey, D Pandey, S Wairya… - Cyber security and …, 2022 - Wiley Online Library
In the present day, images and videos account for nearly 80% of all the data transmitted
during our daily activities. This work employs a combination of novel stegnography and data …

An integration of keyless encryption, steganography, and artificial intelligence for the secure transmission of stego images

D Pandey, VK Nassa, A Jhamb, D Mahto… - … approach to modern …, 2021 - igi-global.com
Protected stored data as well as transfer in this virtual environment have been a significant
thing since this world wide web has been used for information exchange. The need for data …

Secure text extraction from complex degraded images by applying steganography and deep learning

BK Pandey, D Mane, VKK Nassa, D Pandey… - … approach to modern …, 2021 - igi-global.com
This work's primary goal is to secure the transmission of text hidden within the cover image
using steganography over a public network of computers. Steganography is a powerful tool …

Steganography using improved LSB approach and asymmetric cryptography

S Pramanik, D Samanta, S Dutta… - … on advent trends in …, 2020 - ieeexplore.ieee.org
Steganography deals with the craft of obscuring private data inside a spread media. In
confidential data communication security is a vital issue. In this paper, we use a two-layer …

A new combinational technique in image steganography

S Pramanik, D Samanta… - International Journal of …, 2021 - igi-global.com
Internet is used for exchanging information. Sometimes it is needed to transmit confidential
data via internet. Here the authors use image steganography to pass confidential data within …

Deep Learning-Based Cancer Detection Technique

S Ahamad, V Veeraiah, JVN Ramesh… - … of Research on Thrust …, 2023 - igi-global.com
The time is now for deep learning (DL)-dependent analysis of healthcare images to move
from the realm of exploratory research projects to that of translational ones, and eventually …

Agriculture using Smart Sensors

AK Saxena, R Kumar, V Srikanth… - … in Agriculture: Tools …, 2024 - books.google.com
The people's most basic and important employment is agriculture. Urbanization poses a
newer issues and causes a bulk exodus of village residents to the metropolitan as a result of …

Applications of Graphs in Smart Cities

D Sensarma - Handbook of Research on Data-Driven Mathematical …, 2023 - igi-global.com
Many megacities will emerge in the twenty-first century as a result of urbanization as a
megatrend. Essential services like electricity, water, mobility, manufactured products, and …