Optimized multimedia data through computationally intelligent algorithms
In the field of data exchange, the security of information is the critical aspect. This void in the
security helped the evolution of steganography to address the problem of security …
security helped the evolution of steganography to address the problem of security …
A novel image steganographic method based on integer wavelet transformation and particle swarm optimization
Image steganography is a technique of hiding secret data into a cover image and so as to
prevent the intruders from accessing the secret data. The efficiency of image steganography …
prevent the intruders from accessing the secret data. The efficiency of image steganography …
Double-matrix decomposition image steganography scheme based on wavelet transform with multi-region coverage
P Pan, Z Wu, C Yang, B Zhao - Entropy, 2022 - mdpi.com
On the basis of ensuring the quality and concealment of steganographic images, this paper
proposes a double-matrix decomposition image steganography scheme with multi-region …
proposes a double-matrix decomposition image steganography scheme with multi-region …
[PDF][PDF] Chaotic map based random image steganography using lsb technique.
S Rajendran, M Doraipandian - Int. J. Netw. Secur., 2017 - ijns.jalaxy.com.tw
Steganography play an important role to transfer secret data over insecure network.
Moreover digital images are taken as a cover to communicate the sensitive data. One of the …
Moreover digital images are taken as a cover to communicate the sensitive data. One of the …
Secure information embedding in images with hybrid firefly algorithm
S Nokhwal, M Chandrasekharan… - arXiv preprint arXiv …, 2023 - arxiv.org
Various methods have been proposed to secure access to sensitive information over time,
such as the many cryptographic methods in use to facilitate secure communications on the …
such as the many cryptographic methods in use to facilitate secure communications on the …
(Retracted) Evaluation of bioinspired algorithms for image optimization
N Sharma, C Chakraborty - Journal of Electronic Imaging, 2022 - spiedigitallibrary.org
The Editor-in-Chief and the publisher have retracted this article, which was submitted as part
of a guest-edited special section. An investigation uncovered evidence of systematic …
of a guest-edited special section. An investigation uncovered evidence of systematic …
Using PSO in a spatial domain based image hiding scheme with distortion tolerance
With tremendous advancement in digital technology, efficient steganography techniques are
needed for the security and copyright protection of digital information being transmitted over …
needed for the security and copyright protection of digital information being transmitted over …
An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method
S Sajasi, AME Moghadam - Applied Soft Computing, 2015 - Elsevier
Steganography is the science of hiding secret message in an appropriate digital multimedia
in such a way that the existence of the embedded message should be invisible to anyone …
in such a way that the existence of the embedded message should be invisible to anyone …
Computational intelligence for information security: A survey
R Wang, W Ji - IEEE Transactions on Emerging Topics in …, 2020 - ieeexplore.ieee.org
Information security is the set of processes that protect information away from unauthorized
access, disclosure, replication, modification, or destruction. Recently, more and more real …
access, disclosure, replication, modification, or destruction. Recently, more and more real …
Multimodal biometric authentication using PSO based watermarking
Multimodal Biometrics is the usage of multiple biometric indicators by personal identification
systems for identifying individuals. It is applied to secure and authenticate the biometric data …
systems for identifying individuals. It is applied to secure and authenticate the biometric data …