An efficient sound and data steganography based secure authentication system

D Datta, L Garg, K Srinivasan, A Inoue, GT Reddy… - 2021 - um.edu.mt
The prodigious advancements in contemporary technologies have also brought in the
situation of unprecedented cyber-attacks. Further, the pin-based security system is an …

A preliminary study on quality of experience assessment of compressed audio file format

JA Baloch, AK Jumani, AA Laghari, VV Estrela… - 2021 Ieee …, 2021 - ieeexplore.ieee.org
Audio compression formats reduce the file size before downloading and uploading on the
Cloud and social media platforms. An audio codec performs this operation. The …

Asymmetric Orientation Combination for Reversible and Authenticable Data Hiding of Dual Stego-images

JY Lin, JH Horng, CC Chang, YH Li - Symmetry, 2022 - mdpi.com
A dual-image-based reversible data hiding (RDH) scheme can conceal secret data into a
cover image by creating two steganographic images. These two stego-images can …

Face morphing attack detection in the presence of post-processed image sources using neighborhood component analysis and decision tree classifier

OM Kenneth, SA Bashir, OA Abisoye… - … on Information and …, 2020 - Springer
Abstract Recently, Face Morphing Attack Detection (MAD) has gained a great deal of
attention as criminals have started to use freely and easily available digital manipulation …

Selecting optimal submatrix for syndrome-trellis codes (stcs)-based steganography with segmentation

X Zhang, R Wang, D Yan, L Dong, Y Lin - IEEE Access, 2020 - ieeexplore.ieee.org
Syndrome-Trellis Codes (STC), as the de facto state-of-the-art steganography framework,
has drawn huge attention recently. However, the original STC merely developed with the …

A meminductor-based chaotic system

A Qi, L Ding, W Liu - Information Technology and Control, 2020 - itc.ktu.lt
We propose a meminductor-based chaotic system. Theoretical analysis and numerical
simulations reveal complex dynamical behaviors of the proposed meminductor-based …

Comparative Analysis of Performances of Convolutional Neural Networks for Image Classification Tasks

AA Alfa, S Misra, A Yusuf, A Agrawal - Proceedings of International …, 2023 - Springer
The main success of CNNs is in their capability to learn features automatically from domain-
specific images unlike the other machine learning schemes. During training phase, CNN …

A CRT-LZW-Based Compression of Multiple and Large Size Images for Clustered Embedding in Image Cover

AA Alfa, KB Ahmed, S Misra, C Dhawale… - Soft Computing for …, 2021 - Springer
The main target of steganographic schemes is to enforce privacy and security of wireless
mode of communication between parties. The image steganography attempts to embed …

Face Morphing Attack Detection in the Presence of Post-processed Image Sources Using Neighborhood Component Analysis and Decision Tree Classifier

MK Ogbuka, SA Bashir, AA Opeyemi, AD Mohammed - 2021 - repository.futminna.edu.ng
Recently, Face Morphing Attack Detection (MAD) has gained a great deal of attention as
criminals have started to use freely and easily available digital manipulation techniques to …

Face Morphing Attack Detection in the Presence of Post-processed Image Sources Using Neighborhood Component Analysis and Decision Tree Classifier

OK Mary, AS Bashir, OA Abisoye - 2020 - repository.futminna.edu.ng
Recently, Face Morphing Attack Detection (MAD) has gained a great deal of attention as
criminals have started to use freely and easily available digital manipulation techniques to …