IDEAW: Robust Neural Audio Watermarking with Invertible Dual-Embedding

P Li, X Zhang, J Xiao, J Wang - arXiv preprint arXiv:2409.19627, 2024 - arxiv.org
The audio watermarking technique embeds messages into audio and accurately extracts
messages from the watermarked audio. Traditional methods develop algorithms based on …

[PDF][PDF] An efficient hybrid technique for message encryption using Caesar cipher and deoxyribonucleic acid steganography

YNA Taher, KA Ameen… - Indonesian Journal of …, 2022 - academia.edu
Due to security threats on data transmission, a combination of cryptography and
steganography techniques are becoming increasingly popular and widely adopted …

A Comparative Analysis of Various Loss Functions for Image Data Hiding Using Deep Neural Network

M Chanchal, P Malathi - Inventive Communication and Computational …, 2022 - Springer
In today's highly emerging and dynamic world, data and information plays a major part in
computer communication and the global economy. The improvement in the computing and …

Outperforming Cryptocurrency Price Prediction Using Deep Reinforcement Learning Approach

PVRS Rao, B Natarajan… - 2023 International …, 2023 - ieeexplore.ieee.org
Cryptocurrency price prediction is a complex and dynamic task. Cryptocurrencies are highly
volatile digital assets impacted by a wide range of variables, including investor mood …

Image Data Hiding Scheme Using Adversarial Embedding

R Varman, P Malathi - 2023 Innovations in Power and …, 2023 - ieeexplore.ieee.org
Data and information are increasingly at risk due to developments in science and
technology. Several strategies for hiding information have been proposed to deal with these …

An Efficient Approach for Obstacle Avoidance and Navigation in Robots

MP Shanmukh, B Natarajan, C Kannan… - 2023 International …, 2023 - ieeexplore.ieee.org
Reinforcement learning has emerged as a prominent technique for enhancing robot
obstacle avoidance capabilities in recent years. This research provides a comprehensive …

Enhancing Traffic Efficiency through Real-Time Traffic Signal Control Using Deep Q-Learning

H Katragadda, B Natarajan… - … Global Conference on …, 2023 - ieeexplore.ieee.org
This research manuscript delves into the employment of advanced technologies for the
enhancement of traffic efficiency, leveraging real-time data and deep reinforcement learning …

Exploiting Neural Network Model for Hiding and Triggering Malware

VR Gurram, PP Amritha, M Sethumadhavan - World Conference on …, 2023 - Springer
In the recent years, security issues have been increasing with the rapid development of
artificial intelligence technology. Malware delivery is important for exploitation of the target …

Analysis of Deep Steganography Robustness Using Various Loss Functions

V Chekatamala, P Malathi… - 2022 6th International …, 2022 - ieeexplore.ieee.org
In modern data hiding systems, the information is being hidden in images using CNN's
(Convolutional Neural Networks) especially the methods like Deep Steganography have …

Enhancing Data Hiding with Deep Steganography: Leveraging CNNs and Loss Function Optimization for Robustness and Quality

M Pa, GK Ta - papers.ssrn.com
Data hiding techniques in recent years have utilized CNNs (Convolutional Neural
Networks), particularly Deep Steganography techniques, which are extremely popular in the …