Digital image steganography and steganalysis: A journey of the past three decades

AK Sahu, M Sahu - Open Computer Science, 2020 - degruyter.com
Steganography is the science and art of covert communication. Conversely, steganalysis is
the study of uncovering the steganographic process. The evolution of steganography has …

A model for overflow queuing network with two-station heterogeneous system

S Saritha, E Mamatha, CS Reddy… - … Journal of Process …, 2022 - inderscienceonline.com
Network systems with overflow arrivals are the utmost imperative problems in high priority
queuing system, where the customers are reluctant to join the queue. If the servers are free …

[PDF][PDF] A novel approach of image steganography for secure communication based on LSB substitution technique

S Rahman, F Masood, WU Khan, N Ullah… - … , Materials & Continua, 2020 - academia.edu
Steganography aims to hide the messages from unauthorized persons for various purposes,
eg, military correspondence, financial transaction data. Securing the data during …

[PDF][PDF] An efficient line clipping algorithm in 2D space.

M Elliriki, CCS Reddy, K Anand - Int. Arab J. Inf. Technol., 2019 - ccis2k.org
Clipping problem seems to be pretty simple from human perspective point of view since with
visualization a line can easily be traced whether it is completely inside and if not what …

Analysis of planar arrays using Sudoku puzzles for multiple beamforming

R Chandra, TD Bufler… - … Sensor Technology XXV, 2021 - spiedigitallibrary.org
In several wireless applications involving communication and radar systems, the concept of
Frequency Diverse Arrays (FDA) is becoming a popular choice. These types of arrays …

Microcontroller Based AVR Hazardous Gas Detection System using IoT

R Prasad - arXiv preprint arXiv:2305.12855, 2023 - arxiv.org
MQ-6 Semiconductor Sensor for Combustible Gas detection is a Sensitive Gas sensor. The
sensitive material of this MQ-6 gas sensor is SnO2, which works with lower conductivity in …

A reliable data hiding scheme using jigsaw Sudoku

W Lyu, D Yin, Y Zhang, J Deng - 2018 International Conference …, 2018 - atlantis-press.com
A distinctive data hiding method based on Jigsaw Sudoku is proposed in this paper.
Different from other methods, the proposed method is based on Jigsaw Sudoku which is a …

A Study on Queuing Systems and its Deterministic Measures

CS Reddy, SK Anand - International Journal of Advanced …, 2022 - search.proquest.com
In this paper we show that queueing theory can accurately model the flow of in-patient in
hospital. In which arrival rate, service rate and number of parallel servers are all considered …

A Split Key Unique Sudoku Steganography (SKUSS)-Based Reversible High Embedded Data Hiding Technique

UK Malviya, VS Rathore - … Vision and Bio-Inspired Computing: ICCVBIC …, 2021 - Springer
Confidential data transfer or secure communication is always remaining as an essential
need in this era of modern communication. This research work is an implementation of a …

[PDF][PDF] Scientific Trends and Role of Robots in the Agricultural Sector

E Mamatha, S Saritha, K Anand… - International Journal of …, 2020 - academia.edu
-------------------------------------------------------------------ABSTRACT-------------------------------------------
--------------------The agriculture sector is essential to implement the automation technology to …