[PDF][PDF] A Review on the Recent Trends of Image Steganography for VANET Applications.

AS Ansari - Computers, Materials & Continua, 2024 - cdn.techscience.cn
Image steganography is a technique of concealing confidential information within an image
without dramatically changing its outside look. Whereas vehicular ad hoc networks …

[HTML][HTML] Steganographic Model to Conceal the Secret Data in Audio Files Utilizing a Fourfold Paradigm: Interpolation, Multi-Layering, Optimized Sample Space, and …

DT Firdaus, NJ De La Croix, T Ahmad… - Journal of Safety …, 2024 - Elsevier
Audio steganography techniques are evaluated using performance metrics such as payload
capacity, stego audio file quality, and security (imperceptibility of hidden data). Increasing …

Shape and textural based image retrieval using K-NN classifier

SD Pande, SB Rathod, MSR Chetty… - Journal of Intelligent …, 2022 - content.iospress.com
Due to the evolution in the digital domain limitless multimedia is generated daily. It creates a
necessity of potential and appealing image resuscitation system. In this paper, a shape and …

A Novel LSB Steganography Technique Using Image Segmentation.

YY Demircan, S Ozekes - Journal of Universal Computer …, 2024 - search.ebscohost.com
Steganography is a process to hide data inside a cover file mostly used in media files like
image, video, and audio files. Least significant bit (LSB) steganography is a technique …

Research on the Application of Behavioral Image Feature Capture in Basketball Game Video

Y Zhang, W Wei - Journal of Internet Technology, 2024 - jit.ndhu.edu.tw
In order to realize intelligent image recognition of foul behavior in basketball games, this
paper designs a feature capture method of video foul behavior based on improved bilateral …

[PDF][PDF] Minimizing Sample Space to Optimize Quality of Stego-Audio.

MM Amrulloh, T Ahmad - International Journal of Intelligent Engineering & …, 2022 - inass.org
The rapid progress of information and communication technology forces all application
aspects to be developed securely, considering that data are often transmitted over public …

A Secure Image Stegnography using LSB and XOR Operation

N Rathour, P Rawat - 2022 IEEE 2nd Mysore Sub Section …, 2022 - ieeexplore.ieee.org
Since it serves as a substitute for secure transmission, data concealing has received a lot of
attention recently. Several image embodiment approaches, like the Least Significant Bit …

A Three-bit Image Stegnography for Enhancing Image Quality in Medical Application

N Rathour, P Rawat - 2022 IEEE 2nd Mysore Sub Section …, 2022 - ieeexplore.ieee.org
In comparison to conventional methods, the internet's infrastructure has undergone
enormous advancements. Consequently, special caution and protection are required for the …

Deep Key Generation: End to End Encryption for Generic Communication

K Kausalya, B Chandra, V Manoj - … Conference on Advances …, 2023 - ieeexplore.ieee.org
Steganography is the process of concealing a message's real nature by enclosing it in other
information. Due to their ubiquitous use on the internet, digital photographs are the most …

Research on Image Stegnography using based on Suduko matrix and LSB Value with multi-level encryption

N Rathour, P Rawat - 2022 IEEE 2nd Mysore Sub Section …, 2022 - ieeexplore.ieee.org
In order to conceal data in such a manner that is invisible to a viewer, digital steganography
makes use of the host signal. A complete reproduction of the actual picture is possible with …