StegAbb: A cover-generating text steganographic tool using GPT-3 language modeling for covert communication across SDRs

MV Namitha, GR Manjula, MC Belavagi - IEEE Access, 2024 - ieeexplore.ieee.org
The textual data unlike images, videos, and audio will not get much distorted while
transmitting across the network. Steganography is the process of hiding secret data inside …

Image steganography based on SVD and DWT techniques

B Lakshmi Sirisha - Journal of Discrete Mathematical Sciences and …, 2020 - Taylor & Francis
Steganography is an invisible communication. It embeds the secret details into cover to
generate the stego information. A novel image steganography approach based on Singular …

Least significant bit technology for hiding text data using video steganography

HA Ali, AJ Jalil, MK Hussein - … Computing Electronics and …, 2024 - telkomnika.uad.ac.id
Due to the rapid development of information technology, the process of exchanging
information over the web has become simple and fast. Nevertheless, the transmission of …

[PDF][PDF] Semantic segmentation of aerial images using u-net architecture

SK Hussein, KH Ali - Iraqi J. Electr. Electron. Eng, 2021 - iasj.net
Arial images are very high resolution. The automation for map generation and semantic
segmentation of aerial images are challenging problems in semantic segmentation. The …

FPGA implementation of image steganography using Haar DWT and modified LSB techniques

HNN Simha, PM Prakash, SS Kashyap… - … on Advances in …, 2016 - ieeexplore.ieee.org
Security places an important role in communication applications for secure data transfers.
Image Steganography is one of the most reliable technique in encryption and decryption of …

An Analytical Study on Video Steganography Techniques.

H Goyal, P Bansal - International Journal of Advanced …, 2015 - search.ebscohost.com
Steganography refers to the art and science of secret communication in which the
information is concealed in such a way so that it does not drive an eavesdropper's …

[PDF][PDF] Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT

N Sathisha, KS Babu, KB Raja… - International Journal of …, 2015 - Citeseer
Steganography is an authenticated technique for maintaining secrecy of embedded data.
Steganography provides hardness of detecting the hidden data and has a potential capacity …

Implementation of Image Encryption by Steganography Using Discrete Wavelet Transform in Verilog

KB Sowmya, PS Bhat, S Hegde - Advances in Multidisciplinary Medical …, 2021 - Springer
Steganography is a data encryption technique where a secret message is hidden within
another message in such a way that it is difficult to determine the existence or contents of the …

[PDF][PDF] FPGA Implementation of Image Steganography using Haar DWT and Modified LSB Techniques

NS HN, PM Prakash, SS Kashyap, S Sarkar - researchgate.net
Security places an important role in communication applications for secure data transfers.
Image Steganography is one of the most reliable technique in encryption and decryption of …

[引用][C] Video steganography using neural network and genetic algorithm

H Goyal, P Bansal - Int. J. Emerg. Technol. Innov. Eng, 2015