Zobrazeno 1 - 10
of 509
pro vyhledávání: '"stego-image"'
Publikováno v:
Mathematics, Vol 12, Iss 21, p 3333 (2024)
Currently, a significant number of pre-trained models are published online to provide services to users owing to the rapid maturation and popularization of machine learning as a service (MLaaS). Some malicious users have pre-trained models illegally
Externí odkaz:
https://doaj.org/article/69999d0596d6414294a28767940f0516
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 8, Pp 5349-5365 (2022)
Traditional image steganography conceals secret data into the cover image and then transmits the resulting stego-image to the intended recipient via an insecure channel. The intruders try to sense the channel but cannot easily find any clues regardin
Externí odkaz:
https://doaj.org/article/3e523767f620467180790c3a8fc8cd53
Publikováno v:
PeerJ Computer Science, Vol 9, p e1379 (2023)
Information security has become increasingly challenging as a result of massive advancements in information and communication technologies. Due to the necessity of exchanging private information and the open nature of the network, there is an increas
Externí odkaz:
https://doaj.org/article/ca8ad3ad99e746919caad2d8e0ee564b
Autor:
May H. Abood, Sarah W. Abdulmajeed
Publikováno v:
Al-Iraqia Journal for Scientific Engineering Research, Vol 1, Iss 2 (2022)
In the latest, digital images are frequently used for storage, communication, medical imaging, etc. Such images possibly involve private data, which accordingly handed an important role to information security. Image encryption and steganography are
Externí odkaz:
https://doaj.org/article/341cf58f88074894884b4475ae6379fe
Publikováno v:
Wasit Journal of Computer and Mathematics Science, Vol 1, Iss 4 (2022)
The objective of hiding text in an image is hiding text without raising suspicions that the image contains a hidden message or text, which leads to protecting and maintaining text confidentiality. The previous hiding methods have problems in capacity
Externí odkaz:
https://doaj.org/article/c50e35a5b2894b9fab1cb68175e80309
Publikováno v:
PeerJ Computer Science, Vol 8, p e1115 (2022)
The main challenge in steganography algorithms is balancing between the size of the secret message (SM) that is embedded in the cover image (CI) and the quality of the stego-image (SI). This manuscript proposes a new steganography algorithm to hide a
Externí odkaz:
https://doaj.org/article/d1620ba51e8c47f0ac9bdbdf73fce32e
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Cybernetics and Information Technologies, Vol 21, Iss 2, Pp 89-104 (2021)
In this study we propose a new approach to tackle the cropping problem in steganography which is called Center Embedded Pixel Positioning (CEPP) which is based on Least Significant Bit (LSB) Matching by setting the secret image in the center of the c
Externí odkaz:
https://doaj.org/article/edcbbaa578ad43ccb0d66e1ef18ab190
Publikováno v:
Baghdad Science Journal, Vol 19, Iss 1 (2022)
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such
Externí odkaz:
https://doaj.org/article/5efcb8f9990f484cab54a05e56ee34bc