Double layer security using crypto-stego techniques: a comprehensive review

A Jan, SA Parah, M Hussan, BA Malik - Health and Technology, 2022 - Springer
Recent advancement in the digital technology and internet has facilitated usage of
multimedia objects for data communication. However, interchanging information through the …

Image steganography using deep learning based edge detection

B Ray, S Mukhopadhyay, S Hossain, SK Ghosal… - Multimedia Tools and …, 2021 - Springer
This paper introduces a deep learning-based Steganography method for hiding secret
information within the cover image. For this, we use a convolutional neural network (CNN) …

Intrusion detection: A model based on the improved vision transformer

YG Yang, HM Fu, S Gao, YH Zhou… - Transactions on …, 2022 - Wiley Online Library
We propose an intrusion detection model based on an improved vision transformer (ViT).
More specifically, the model uses an attention mechanism to process data, which overcomes …

A secured image steganography method based on ballot transform and genetic algorithm

S Hossain, S Mukhopadhyay, B Ray, SK Ghosal… - Multimedia Tools and …, 2022 - Springer
Rapid advances in digital technology have facilitated us to transfer a huge amount of
electronic files over the internet. But in the presence of malicious attackers, the security, as …

Image contrast improvement through a metaheuristic scheme

S Mukhopadhyay, S Hossain, S Malakar, E Cuevas… - Soft Computing, 2023 - Springer
Contrast enhancement is an important pre-processing task for several image and video
processing applications. The objective of a contrast enhancement method is to improve the …

Developing an attack detection framework for wireless sensor network‐based healthcare applications using hybrid convolutional neural network

CA Subasini, SP Karuppiah, A Sheeba… - Transactions on …, 2021 - Wiley Online Library
Attack detection is the major issue in healthcare‐based wireless sensor networks (H‐
WSNs). Due to their low processing speed, very low storage space, poor attack detection …

Pencil shell matrix based image steganography with elevated embedding capacity

S Mukherjee, S Sarkar, S Mukhopadhyay - Journal of Information Security …, 2021 - Elsevier
Image steganography is a mechanism that imperceptibly conceals information in a cover
image while also enabling the concealed details to be reliably retrieved from that image. The …

A novel and robust hybrid blockchain and steganography scheme

M Takaoğlu, A Özyavaş, N Ajlouni, A Alshahrani… - Applied Sciences, 2021 - mdpi.com
Data security and data hiding have been studied throughout history. Studies show that
steganography and encryption methods are used together to hide data and avoid detection …

A robust and imperceptible n-Ary based image steganography in DCT domain for secure communication

R Kaur, B Singh - Multimedia Tools and Applications, 2024 - Springer
Generally, spatial domain and transform domain steganography techniques are used to
achieve the covert communication. The main drawback of embedding in frequency domain …

A multi-level thresholding image segmentation algorithm based on equilibrium optimizer

P Hu, Y Han, Z Zhang, SC Chu, JS Pan - Scientific Reports, 2024 - nature.com
Multi-level thresholding for image segmentation is one of the key techniques in image
processing. Although numerous methods have been introduced, it remains challenging to …