OPTP: A new steganography scheme with high capacity and security

M Hadian Dehkordi, S Mashhadi, ST Farahi… - Multimedia Tools and …, 2024 - Springer
Steganography is the art of hiding secret information (text, audio, video, image or file) in a
cover medium. Our goal in this paper is to propose a new image steganography scheme that …

Sterilization of image steganography using self-supervised convolutional neural network

J Liu, F Xu, Y Zhao, X Xin, K Liu, Y Ma - PeerJ Computer Science, 2024 - peerj.com
Background With the development of steganography technology, lawbreakers can
implement covert communication in social networks more easily, exacerbating network …

[PDF][PDF] Online teaching emotion analysis based on GRU and nonlinear transformer algorithm

L Ding - PeerJ Computer Science, 2023 - peerj.com
Nonlinear models of neural networks demonstrate the ability to autonomously extract
significant attributes from a given target, thus facilitating automatic analysis of classroom …

An Effect of Huffman Encoding with Hybrid Edge Detection in LSB Image Steganography

AM Elgaier, AM Abushaala - 2024 IEEE 4th International …, 2024 - ieeexplore.ieee.org
With the development and spread of technology in the world and its increasing speed, the
danger of attacking data has increased and spread with it, therefore, data exchanged …

[PDF][PDF] Hiding algorithm based fused images and Caesar cipher with intelligent security enhancement.

HH Abed, AS Shaeel… - International Journal of …, 2023 - academia.edu
Due to the open nature of the internet, users face the danger of having their private
information intercepted or distorted while taking advantage of the convenient electronic …

Cipher Care: Multi-Authentication Video Steganography Powered by CNNs

L Venkatraman, S Niksheetha… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
In the age of digital communication and safeguarding data, the imperative to discreetly hide
confidential information in plain view has grown significantly crucial. This paper, titled" …

Robust and Sophisticated Combined-Layered Security: Secured 6G Mobile Network Considerations

T Srour, MAM El-Bendary, M Eltokhy, AE Abouelazm - 2024 - researchsquare.com
Deep learning, machine learning and artificial intelligence have been proposed for
enhancing the multimedia processing and security as well as the advanced security tools for …

Deep Secrecy: Advancing Image Steganography Via Deep Learning Technique

M Khan, A Khalid, F Nasim - Journal of Innovative Computing and …, 2024 - jicet.org
In today's internet-driven world, while seamless connectivity and social media make tasks
easier, they also bring risks like hacking and data theft. Steganography is an emerging field …

Flexible Multi-Layered Security System: Secure 6G Mobile Network Considerations

T Srour, MAM El-Bendary, M Eltokhy, AE Abouelazm - 2023 - researchsquare.com
The vision of 6G networks refers to linking undersea, terrestrial, and space networks
together. This vision involves transferring a massive amount of data over the network. 6G …

Security Features on and with Documents: A Survey

C Yamini, N Priya - International Conference on Intelligent Systems Design …, 2023 - Springer
In today's world, Security for any means has become really important. That stands for either
hard copy or the soft copy of any document. The concept of online transactions or simply …