Zobrazeno 1 - 10
of 607
pro vyhledávání: '"embedding capacity"'
Publikováno v:
In Journal of Information Security and Applications March 2025 89
Publikováno v:
Cybernetics and Information Technologies, Vol 24, Iss 1, Pp 157-170 (2024)
In this research, we propose two new image steganography techniques focusing on increasing image-embedding capacity. The methods will encrypt and hide secret information in the edge area. We utilized two hybrid methods for the edge detection of the i
Externí odkaz:
https://doaj.org/article/a9b58b806b064aaab1d64b333c791dfe
Publikováno v:
Discover Internet of Things, Vol 3, Iss 1, Pp 1-13 (2023)
Abstract In an increasingly digitized world, secure communication plays a pivotal role in safeguarding sensitive information and ensuring the confidentiality of data transmission. Conventional encryption techniques are robust but often result in a lo
Externí odkaz:
https://doaj.org/article/7b2448cff6714fdfa4573451ed9569e9
Publikováno v:
Discover Internet of Things, Vol 3, Iss 1, Pp 1-16 (2023)
Abstract The exponential growth of the Internet of Things (IoT) has led to an increased demand for secure and efficient data transmission methods. However, there is a tradeoff in the image quality and hiding capacity in the data hiding methods. There
Externí odkaz:
https://doaj.org/article/840641386a114b3aaf8679b6e195098a
Publikováno v:
Информатика и автоматизация, Vol 22, Iss 5, Pp 1103-1151 (2023)
2D and 3D digital multimedia files offer numerous benefits like excellent quality, compression, editing, reliable copying, etc. These qualities of the multimedia files, on the other hand, are the cause of fear including the fear of getting access to
Externí odkaz:
https://doaj.org/article/79139f09241743fb9805cb380d6e42bc
Publikováno v:
Applied Sciences, Vol 14, Iss 14, p 6267 (2024)
Reversible data hiding in encrypted images (RDH-EI) schemes based on secret sharing have emerged as a significant area of research in privacy protection. However, existing algorithms have limitations, such as low embedding capacity and insufficient p
Externí odkaz:
https://doaj.org/article/a951873236b74c89b68e8d2668c5d2be
Publikováno v:
Cyber Security and Applications, Vol 2, Iss , Pp 100028- (2024)
In the field of data concealing, edge detection techniques are frequently employed, particularly for improving image quality and data security. These methods, however, have a lower embedding capacity. In order to take advantage of more edge pixels, m
Externí odkaz:
https://doaj.org/article/22ae7a991d964ebe974a38c138920f2d
Publikováno v:
Iraqi Journal of Information & Communication Technology, Vol 6, Iss 3 (2023)
Video steganography is the common field of data security in digital communication where data include text, image, and video. Compressed video is the suitable modern source for hiding huge secret data that will trust security. This work proposed a com
Externí odkaz:
https://doaj.org/article/e8d398d0438f408596844af57f491a3a
Publikováno v:
IEEE Access, Vol 11, Pp 125768-125789 (2023)
Nowadays, secret information is susceptible to numerous hacks while being shared through traditional correspondence channels. Unlike other methods of securing data, steganography offers the most comprehensive security. Several algorithms have been de
Externí odkaz:
https://doaj.org/article/0b2f0ba6c8cb474ab3fd4417c6950aa6
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.