Y Liu, S Liu, Y Wang, H Zhao, S Liu - Neurocomputing, 2019 - Elsevier
Video steganography is becoming an important research area in various data hiding technologies, which has become a promising tool because not only the security requirement …
S Gao, Y Yu, Y Wang, J Wang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
JADE is a differential evolution (DE) algorithm and has been shown to be very competitive in comparison with other evolutionary optimization algorithms. However, it suffers from the …
This paper presents a literature review of image steganography techniques in the spatial domain for last 5 years. The research community has already done lots of noteworthy …
In the field of data exchange, the security of information is the critical aspect. This void in the security helped the evolution of steganography to address the problem of security …
In recent years, we face an increasing interest in protecting multimedia data and copyrights due to the high exchange of information. Attackers are trying to get confidential information …
M Dalal, M Juneja - Multimedia Tools and Applications, 2021 - Springer
Steganography and steganalysis is a relatively new-fangled scientific discipline in security systems and digital forensics, respectively, but one that has matured greatly over the past …
L Liu, H Xiang, X Li - Nonlinear Dynamics, 2021 - Springer
A chaotic map, which is realized on finite precision device, such as computer, will suffer dynamical degradation. Such chaotic maps cannot be regarded as rigorous chaos anymore …
With the rapid growth of multimedia technologies, many images are communicated over public channels. Therefore, significant interest has been given to providing secure …
Meta-heuristic optimization algorithms have been used to solve mathematically unidentifiable problems. The main purpose of the optimization methods on problem-solving …