An imperceptible LSB image hiding on edge region using DES encryption

EJ Kusuma, OR Indriani, CA Sari… - … on Innovative and …, 2017 - ieeexplore.ieee.org
Sending image in a plain form has a high risk for the data being vulnerable to steal. Thus,
due to reducing the risk, data security techniques should be implemented. Data security …

[PDF][PDF] A Review on the Recent Trends of Image Steganography for VANET Applications.

AS Ansari - Computers, Materials & Continua, 2024 - cdn.techscience.cn
Image steganography is a technique of concealing confidential information within an image
without dramatically changing its outside look. Whereas vehicular ad hoc networks …

A new information hiding method based on improved BPCS steganography

S Sun - Advances in Multimedia, 2015 - Wiley Online Library
Bit‐plane complexity segmentation (BPCS) steganography is advantageous in its capacity
and imperceptibility. The important step of BPCS steganography is how to locate noisy …

Defects' geometric feature recognition based on infrared image edge detection

L Junyan, T Qingju, W Yang, L Yumei… - Infrared Physics & …, 2014 - Elsevier
Edge detection is an important technology in image segmentation, feature extraction and
other digital image processing areas. Boundary contains a wealth of information in the …

Improved detection of 1-2-4 lsb steganography and rsa cryptography in color and grayscale images

S Goyal, M Ramaiya, D Dubey - 2015 International Conference …, 2015 - ieeexplore.ieee.org
Steganography is the art of the hidden data in such a way that it detection of hidden
knowledge prevents. As the necessity of security and privacy increases, the need of the …

[PDF][PDF] 基于模糊C 均值聚类和Canny 算子的红外图像边缘识别与缺陷定量检测

唐庆菊, 刘俊岩, 王扬, 刘元林, 梅晨 - 红外与激光工程, 2016 - researching.cn
针对脉冲红外热成像检测缺陷构件时, 红外图像噪声较大, 边缘信息模糊等特点,
提出了一种基于模糊C 均值聚类和Canny 算子相结合的边缘检测新方法. 该方法首先对输入的 …

Effects of irregular pores on the shear properties of the plane

X Wang, L Liu - Journal of Physics: Conference Series, 2023 - iopscience.iop.org
Through section analysis and optical microscope observation of thick-section composite
materials, it is found that there are significant differences in pore micro-characteristics of …

[PDF][PDF] Payload and quality augmentation using steganographic optimization technique based on edge detection

M Alanezi, ISM Altaay… - Indones. J. Electr. Eng …, 2021 - researchgate.net
Information security is one of the most significant processes that must be taken into account
when confidentially transferring information. This paper introduces a steganography …

Character Pair Text Steganography Based on the Enhanced

FXK Akotoye, YE Yakavor, J Kwofie… - 2018 IEEE 7th …, 2018 - ieeexplore.ieee.org
Hiding data in text has always been a challenge because textual media contains limited or
no redundant features that could be exploited to achieve steganographic effect. This …

[PDF][PDF] A Novel Hybrid Approach for Secure Cloud Mining using Lossless Image Format

S Manocha, S Vashisht - International Journal of Computer Applications, 2014 - Citeseer
This research work explores the basic features of data mining techniques in cloud
computing and securing the data using edge detection method. This research work tries to …