Double layer security using crypto-stego techniques: a comprehensive review
Recent advancement in the digital technology and internet has facilitated usage of
multimedia objects for data communication. However, interchanging information through the …
multimedia objects for data communication. However, interchanging information through the …
Image steganography using deep learning based edge detection
This paper introduces a deep learning-based Steganography method for hiding secret
information within the cover image. For this, we use a convolutional neural network (CNN) …
information within the cover image. For this, we use a convolutional neural network (CNN) …
Intrusion detection: A model based on the improved vision transformer
YG Yang, HM Fu, S Gao, YH Zhou… - Transactions on …, 2022 - Wiley Online Library
We propose an intrusion detection model based on an improved vision transformer (ViT).
More specifically, the model uses an attention mechanism to process data, which overcomes …
More specifically, the model uses an attention mechanism to process data, which overcomes …
A secured image steganography method based on ballot transform and genetic algorithm
Rapid advances in digital technology have facilitated us to transfer a huge amount of
electronic files over the internet. But in the presence of malicious attackers, the security, as …
electronic files over the internet. But in the presence of malicious attackers, the security, as …
Image contrast improvement through a metaheuristic scheme
Contrast enhancement is an important pre-processing task for several image and video
processing applications. The objective of a contrast enhancement method is to improve the …
processing applications. The objective of a contrast enhancement method is to improve the …
Developing an attack detection framework for wireless sensor network‐based healthcare applications using hybrid convolutional neural network
CA Subasini, SP Karuppiah, A Sheeba… - Transactions on …, 2021 - Wiley Online Library
Attack detection is the major issue in healthcare‐based wireless sensor networks (H‐
WSNs). Due to their low processing speed, very low storage space, poor attack detection …
WSNs). Due to their low processing speed, very low storage space, poor attack detection …
Pencil shell matrix based image steganography with elevated embedding capacity
Image steganography is a mechanism that imperceptibly conceals information in a cover
image while also enabling the concealed details to be reliably retrieved from that image. The …
image while also enabling the concealed details to be reliably retrieved from that image. The …
A novel and robust hybrid blockchain and steganography scheme
Data security and data hiding have been studied throughout history. Studies show that
steganography and encryption methods are used together to hide data and avoid detection …
steganography and encryption methods are used together to hide data and avoid detection …
A robust and imperceptible n-Ary based image steganography in DCT domain for secure communication
R Kaur, B Singh - Multimedia Tools and Applications, 2024 - Springer
Generally, spatial domain and transform domain steganography techniques are used to
achieve the covert communication. The main drawback of embedding in frequency domain …
achieve the covert communication. The main drawback of embedding in frequency domain …
A multi-level thresholding image segmentation algorithm based on equilibrium optimizer
Multi-level thresholding for image segmentation is one of the key techniques in image
processing. Although numerous methods have been introduced, it remains challenging to …
processing. Although numerous methods have been introduced, it remains challenging to …