We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 8,236 results
  1. Reversible image hiding algorithm based on compressive sensing and deep learning

    Compressive sensing (CS) can realize compression and encryption simultaneously. However, the current sampling-reconstruction algorithms based on CS...

    Guodong Ye, Min Liu, ... Bok-Min Goi in Nonlinear Dynamics
    Article 03 May 2023
  2. Information hiding method for long distance transmission in multi-channel IOT based on symmetric encryption algorithm

    In order to improve the security of remote transmission of multi-channel Internet of things, a new information hiding method based on symmetric...

    Jun Jia, Guojiang Zhang, ... Ziquan Liu in Journal of Ambient Intelligence and Humanized Computing
    Article 04 January 2021
  3. An enhanced reversible data hiding algorithm using deep neural network for E-healthcare

    E-healthcare requires communication of patient report to a specialized doctor in a real time scenario. Therefore, any harm to patient medical data...

    Rupali Bhardwaj, Ilina Tripathi in Journal of Ambient Intelligence and Humanized Computing
    Article 04 March 2022
  4. A Comparative Review on Image Interpolation-Based Reversible Data Hiding

    Reversible data hiding (RDH) is one of the most crucial issues in the field of information security in the modern world, as it enables us for...
    Conference paper 2023
  5. A Recent Survey of Reversible Data Hiding Techniques for 2D and 3D Object Models

    In recent years, humans have gradually begun experiencing the world in 3D object models, and the vast use of 3D object models has made them an ideal...
    Amit Verma, Ruchi Agarwal, Bhogeswar Borah in Cryptology and Network Security with Machine Learning
    Conference paper 2024
  6. Coverless information hiding based on the generation of anime characters

    To fundamentally resist the steganalysis, coverless information hiding has been proposed, and it has become a research hotspot in the field of covert...

    Yi Cao, Zhili Zhou, ... **ngming Sun in EURASIP Journal on Image and Video Processing
    Article Open access 03 September 2020
  7. Image content based secure reversible data hiding scheme using block scrambling and integer wavelet transform

    In this article, we propose a novel image dependent based Reversible Data Hiding (RDH) scheme. Suitable regions for data hiding within an image is...

    Ankita Meenpal, Saikat Majumder in Sādhanā
    Article 18 March 2022
  8. Data Hiding and Integrity Verification based on Quotient Value Differencing and Merkle Tree

    The three important quality aspects of image steganography mechanisms are hiding capacity (HC), peak signal-to-noise ratio (PSNR), and attack...

    Dipak Bhayyaji Khadse, Gandharba Swain in Arabian Journal for Science and Engineering
    Article 06 July 2022
  9. Lossless Compression Approach for Reversible Data Hiding in Encrypted Images

    The popularity of multimedia and internet communication has increased abruptly. It is not only vital to save original media without losing...
    Sangeeta Gautam, Ruchi Agarwal, Manoj Kumar in Proceedings on International Conference on Data Analytics and Computing
    Conference paper 2023
  10. Efficient Data Hiding Model by Using RDH Algorithm

    In day-to-day life, information plays a major role. The value of those information becomes higher. So, we need to protect the information from...
    K. Renuka Devi, R. S. Hari karthikkeyyan, ... G. Chandru in Data Intelligence and Cognitive Informatics
    Conference paper 2023
  11. Reversible Data Hiding in Encrypted Image Based on MSB Inversion

    Reversible Data Hiding in the Encrypted image (RDHEI) is an important research topic. This paper improves Korivi and Manikandan's RDHEI method. For...
    Conference paper 2023
  12. Overview of Information Hiding Algorithms for Ensuring Security in IoT Based Cyber-Physical Systems

    Cyber-physical systems are one of the key technological trends in the modern world. However, their use is associated with the need to counter a...
    Oleg Evsutin, Anna Melman, Ahmed A. Abd El-Latif in Security and Privacy Preserving for IoT and 5G Networks
    Chapter 2022
  13. Data Hiding System Based on Variations in Image Interpolation Algorithms

    The new data hiding method that is suggested in this study is based on the variations in picture interpolation methods. To conceal data in a cover...
    Vijaya Lakshmi Adluri, Sai Akshith Guddeti, ... Md. Abu Bakar in Proceedings of International Joint Conference on Advances in Computational Intelligence
    Conference paper 2024
  14. StegYou: Model for Hiding, Retrieving and Detecting Digital Data in Images

    Nowadays, people are not aware of how vulnerable they are to cyber-attacks and theft of personal and sensitive information, from stealing social...
    Ivo Tasevski, Viktorija Nikolovska, ... Vesna Dimitrova in Proceedings of the Future Technologies Conference (FTC) 2022, Volume 2
    Conference paper 2023
  15. A Comparative Analysis of Various Loss Functions for Image Data Hiding Using Deep Neural Network

    In today’s highly emerging and dynamic world, data and information plays a major part in computer communication and the global economy. The...
    Conference paper 2023
  16. Securing Sensitive Medical Information with Basic and Pre-large Coati Optimization Algorithm for E-Health System Data Sanitation

    Privacy preservation is increasingly crucial in e-Health systems, particularly within the realm of privacy-preserving data mining, which aims to...

    M. Madhavi, T. Sasirooba, G. Kranthi Kumar in Wireless Personal Communications
    Article 01 May 2024
  17. A Data Hiding Technique Based on QR Code Decomposition in Transform Domain

    Designed and created by Toyota subsidiary Denso Wave, quick response (QR) code has now been commonly used in many suitable applications to deal with...
    Sakhi Bandyopadhyay, Subhadip Mukherjee, ... Partha Chowdhuri in Proceedings of International Conference on Frontiers in Computing and Systems
    Conference paper 2023
  18. A video coverless information hiding algorithm based on semantic segmentation

    Due to the fact that coverless information hiding can effectively resist the detection of steganalysis tools, it has attracted more attention in the...

    Nan Pan, Jiaohua Qin, ... Guimin Hou in EURASIP Journal on Image and Video Processing
    Article Open access 16 June 2020
  19. Reversible Data-Hiding Scheme Using Color Coding for Ownership Authentication

    The concept of reversible data hiding (RDH) enables the full restoration of the cover image while simultaneously recovering the concealed data from a...
    Anuj Kumar Singh, Sandeep Kumar, Vineet Kumar Singh in Micro-Electronics and Telecommunication Engineering
    Conference paper 2024
  20. Channel Coding Information Hiding Technology Based on Spacecraft Application

    Nowadays, information resources have become the most important part of resources in the Internet era, and the problems of information security have...
    Conference paper 2021
Did you find what you were looking for? Share feedback.