RM Holla, D Suma - Cogent Engineering, 2023 - Taylor & Francis
This paper introduces a highly efficient approach for progressive image secret sharing through the Discrete Hartley Transform (DHT), offering distinct advantages over existing …
D Raghuvanshi, K Joshi, R Nandal, H Sehrawat… - Multimedia Tools and …, 2024 - Springer
This paper addresses the underexplored landscape of chaotic functions in steganography, existing literature when examined under PRISMA-ScR framework it was realized that most of …
EAL Torres, D Alvarado-Nieto… - International Journal of …, 2024 - academia.edu
Given the increase of information circulating through public channels, it is essential to create robust schemes to ensure the security of such information. The results presented here were …
In this research, we propose two new image steganography techniques focusing on increasing image-embedding capacity. The methods will encrypt and hide secret information …
T Leelawattananon… - 2024 12th International …, 2024 - ieeexplore.ieee.org
Small electronic parts counting in the physics laboratory is a challenging task. These small objects such as resistors, capacitors, and inductors are used in physics laboratories and …
L Li, C Yang, J Chen - Chinese Conference on Image and Graphics …, 2023 - Springer
To address the challenge that the current coverless image steganography (CIS) method requires more cover images and more information, a coverless image steganography …
A Sokolov, O Ihnatenko, N Balandina - Problemele Energeticii Regionale, 2024 - ibn.idsi.md
Modern energy systems are often used as a medium for information transmission, including confidential information, which makes relevant the task of ensuring its security, which today …
B Mondal, BR Dutta - International Conference on Computational …, 2023 - Springer
Steganography is a technique of hiding information in another data. In image steganography, the secret message is embedded inside one digital image. The most …