AK Saxena, S Sinha, P Shukla - International Journal of Image …, 2018 - researchgate.net
This paper proposes security technique for the confidential data which is the combination of three techniques, first is image compression that is based on wavelet transformation which …
This paper describes a multi-secret steganographic system for the Internet-of-Things. It uses two user-friendly sensors for data input: thumb joystick and touch sensor. These devices are …
Abstract Information security and confidentiality are the prime concern of any type of communication. The techniques that utilizing inconspicuous digital media such as text …
K Saraswati, PS Sharma - no, 2021 - jctjournals.com
In today world digital Image processing is used in many fields like computer vision, remote sensing, medical imaging, robotics, satellite images and aerial photography etc. There are …
M Ganavi, S Prabhudeva - International Journal of Computer …, 2023 - search.proquest.com
Abstract Information security is an important part of the current interactive world. It is very much essential for the end-user to preserve the confidentiality and integrity of their sensitive …
In this paper we propose a novel transform domain steganography technique—hiding a message in components of linear combination of high order eigenfaces vectors. By high …
SD Muyco, AA Hernandez - … of the 4th International Conference on Big …, 2019 - dl.acm.org
New development in computer security has focused on security using only the cryptography and steganography techniques as well, or the combination of both. In steganography, the …
The development in the cloud computing technologies and the information security policy, the data recovery from the hidden technologies is improved and also it is most implemented …
This paper proposes novel hardware architecture of passive data-hiding scheme for quality access control of digital image in discrete cosine transform compressed domain. Both serial …