OPTP: A new steganography scheme with high capacity and security

M Hadian Dehkordi, S Mashhadi, ST Farahi… - Multimedia Tools and …, 2024 - Springer
Steganography is the art of hiding secret information (text, audio, video, image or file) in a
cover medium. Our goal in this paper is to propose a new image steganography scheme that …

[PDF][PDF] Online teaching emotion analysis based on GRU and nonlinear transformer algorithm

L Ding - PeerJ Computer Science, 2023 - peerj.com
Nonlinear models of neural networks demonstrate the ability to autonomously extract
significant attributes from a given target, thus facilitating automatic analysis of classroom …

[PDF][PDF] Hiding algorithm based fused images and Caesar cipher with intelligent security enhancement.

HH Abed, AS Shaeel… - International Journal of …, 2023 - academia.edu
Due to the open nature of the internet, users face the danger of having their private
information intercepted or distorted while taking advantage of the convenient electronic …

Cipher Care: Multi-Authentication Video Steganography Powered by CNNs

L Venkatraman, S Niksheetha… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
In the age of digital communication and safeguarding data, the imperative to discreetly hide
confidential information in plain view has grown significantly crucial. This paper, titled" …

Robust and Sophisticated Combined-Layered Security: Secured 6G Mobile Network Considerations

T Srour, MAM El-Bendary, M Eltokhy, AE Abouelazm - 2024 - researchsquare.com
Deep learning, machine learning and artificial intelligence have been proposed for
enhancing the multimedia processing and security as well as the advanced security tools for …

Flexible Multi-Layered Security System: Secure 6G Mobile Network Considerations

T Srour, MAM El-Bendary, M Eltokhy, AE Abouelazm - 2023 - researchsquare.com
The vision of 6G networks refers to linking undersea, terrestrial, and space networks
together. This vision involves transferring a massive amount of data over the network. 6G …

User-Oriented Cybersecurity Systems

MR Ogiela, U Ogiela - International Conference on Advanced Information …, 2023 - Springer
In this paper will be presented factors connected with creation of secure user-oriented
security systems. In particular the ways of application personal features and characteristics …

[PDF][PDF] LSB Image-to-Image Steganography in a Secure Way Using the Hash Function

ZI Nezami, D Shehzad, H Ali, M Asif, U Jabbar - 2023 - easychair.org
The goal of this task is to create a system for communicating privately with individuals while
keeping information from the rest of the group. Comparing other items available on the …

Data Hiding System Based on Variations in Image Interpolation Algorithms

VL Adluri, SA Guddeti, P Kanagandula… - … Joint Conference on …, 2022 - Springer
The new data hiding method that is suggested in this study is based on the variations in
picture interpolation methods. To conceal data in a cover picture, our method takes use of …

[PDF][PDF] Improve The Security of Confidential Messages by Combining Cryptography and Image Steganography

ALHH Abed - cnj.atu.edu.iq
Cryptography and steganography are two issues in security systems. Cryptography
scrambles the message to be incomprehensible while steganography shrouds the message …