Developing an adaptive DCT-based steganography method using a genetic algorithm

V Sabeti, A Aghabagheri - Multimedia Tools and Applications, 2023 - Springer
Steganography is an appropriate approach to establish a secure connection between the
sender and the receiver. Data embedding in Discrete Cosine Transform (DCT) coefficients …

[HTML][HTML] A modulo function-based robust asymmetric variable data hiding using DCT

S Khan, K Khan, A Arif, M Hassaballah, J Ali, QTH Ta… - Symmetry, 2020 - mdpi.com
This work presents a new asymmetric data hiding technique that hides a variable number of
secret message bits in the discrete cosine transform (DCT) coefficients of a cover image …

Four enhanced algorithms for full size image hiding in chest x-ray images

A Heednacram, Y Keaomanee - Multimedia Tools and Applications, 2024 - Springer
Several medical consultations and examinations have been undertaken online since the
Covid outbreak. However, when private data was communicated over the internet or …

Multiple images steganography of JPEG images based on optimal payload distribution

Y Pei, X Luo, Y Zhang, L Zhu - Computer Modeling in …, 2020 - ingentaconnect.com
Multiple images steganography refers to hiding secret messages in multiple natural images
to minimize the leakage of secret messages during transmission. Currently, the main …

Adversarial Perturbations Straight on JPEG Coefficients

K Sielmann, P Stelldinger - DAGM German Conference on Pattern …, 2023 - Springer
Adversarial examples are samples that are close to benign samples with respect to a
distance metric, but misclassified by a neural network. While adversarial perturbations of …

[PDF][PDF] Adaptive Image Steganography in the Difference Value of Discrete Cosine Transform Coefficients

V Sabeti, S Ahmadi - Journal of Soft Computing and Information …, 2020 - academia.edu
Steganography is the science and art to conceal the existence of communication, by hiding
information in a digital media, the existence of communication is hidden from the enemy's …

Propose AI system to enhance image steganography

YTZ Al-Baidhani - 2023 - openaccess.altinbas.edu.tr
Steganography is one of the methods used for the hidden exchange of information and it art
of invisible communication. The confidential communication is concealed so that it cannot be …

Two New Algorithms for Effective Information Hiding in Chest X-Ray Images

A Heednacram, Y Keaomanee - Available at SSRN 4156185, 2022 - papers.ssrn.com
Several medical consultations and examinations have been undertaken online due to the
Covid outbreak. However, when private data was communicated over the internet or …

TLBO-Based Optimal Speed Controller Design for Induction Motors Using Fuzzy Sliding Mode Controller

A Alfi - مجله علمی رایانش نرم و فناوری اطلاعات, 2017‎ - jscit.nit.ac.ir
Mobile Ad Hoc Network (MANET) is a special and attractive type of new wireless networks. It
is an autonomous system that can dynamically be set up anywhere and anytime without …

پنهان نگاری تطبیقی تصاویر در مقدار اختلاف ضرایب کسیسنوس گسسته

ثابتی, احمدی - مجله علمی رایانش نرم و فناوری اطلاعات, 2020‎ - jscit.nit.ac.ir
پنهان نگاری علم و هنر پنهان سازی وجود ارتباط است، بدین صورت که با پنهان کردن اطلاعات در یک
رسانه دیجیتال وجود ارتباط از دید فرد متخاصم پنهان می‌ماند. پنهان نگاری در ضرایب تبدیلات …