Audio compression formats reduce the file size before downloading and uploading on the Cloud and social media platforms. An audio codec performs this operation. The …
A dual-image-based reversible data hiding (RDH) scheme can conceal secret data into a cover image by creating two steganographic images. These two stego-images can …
Abstract Recently, Face Morphing Attack Detection (MAD) has gained a great deal of attention as criminals have started to use freely and easily available digital manipulation …
X Zhang, R Wang, D Yan, L Dong, Y Lin - IEEE Access, 2020 - ieeexplore.ieee.org
Syndrome-Trellis Codes (STC), as the de facto state-of-the-art steganography framework, has drawn huge attention recently. However, the original STC merely developed with the …
A Qi, L Ding, W Liu - Information Technology and Control, 2020 - itc.ktu.lt
We propose a meminductor-based chaotic system. Theoretical analysis and numerical simulations reveal complex dynamical behaviors of the proposed meminductor-based …
The main success of CNNs is in their capability to learn features automatically from domain- specific images unlike the other machine learning schemes. During training phase, CNN …
The main target of steganographic schemes is to enforce privacy and security of wireless mode of communication between parties. The image steganography attempts to embed …
MK Ogbuka, SA Bashir, AA Opeyemi, AD Mohammed - 2021 - repository.futminna.edu.ng
Recently, Face Morphing Attack Detection (MAD) has gained a great deal of attention as criminals have started to use freely and easily available digital manipulation techniques to …
OK Mary, AS Bashir, OA Abisoye - 2020 - repository.futminna.edu.ng
Recently, Face Morphing Attack Detection (MAD) has gained a great deal of attention as criminals have started to use freely and easily available digital manipulation techniques to …