A SURVEY PAPER ON AUTOMATED ELECTRONIC TOLLING SYSTEMS USING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY [PDF]
Purpose: In this paper we carry out a review on Automated e-tolling systems using RFID technology that has already been proposed by other researchers.
Nhapi, Lincoln, Phiri, Misheck
core +2 more sources
An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm
This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest–Shamir–Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algorithm, and the key stream is produced iteratively.
Riguang Lin, Sheng Li, Zhiyuan Tan
wiley +1 more source
StyleGAN2-Stego: Secure Coverless Image Steganography via Latent Space Encoding
Coverless image steganography (CIS) enhances secrecy by avoiding direct modifications to existing images, unlike traditional methods that embed data by altering image content. However, many existing approaches struggle to balance payload capacity, visual quality, and resistance to steganalysis.
Ari Ibrahim Hamid +1 more
openalex +3 more sources
A video coverless information hiding algorithm based on semantic segmentation
Due to the fact that coverless information hiding can effectively resist the detection of steganalysis tools, it has attracted more attention in the field of information hiding.
Nan Pan +4 more
doaj +1 more source
End-to-end image steganography using deep convolutional autoencoders [PDF]
Image steganography is used to hide a secret image inside a cover image in plain sight. Traditionally, the secret data is converted into binary bits and the cover image is manipulated statistically to embed the secret binary bits.
Al-Maadeed, S +4 more
core +2 more sources
Steganography Using Reversible Texture Synthesis Based on Seeded Region Growing and LSB [PDF]
Steganography technology has been widely used in data transmission with secret information. However, the existing steganography has the disadvantages of low hidden information capacity, poor visual effect of cover images, and is hard to guarantee ...
Jianfeng Lu +6 more
core +2 more sources
Coverless Information Hiding Based on the Molecular Structure Images of Material [PDF]
The traditional information hiding methods embed the secret information by modifying the carrier, which will inevitably leave traces of modification on the carrier. In this way, it is hard to resist the detection of steganalysis algorithm.
Chongzhi Gao +3 more
core +2 more sources
An adaptive image steganography algorithm based on the use of non-cryptographic hash functions for data extraction [PDF]
Рассматривается адаптивный алгоритм стеганографического скрытия информации, основанный на итеративном внесении малозначительных искажений в блоки полноцветных изображений-контейнеров и использующий быстродействующие некриптографические хеш-функции для ...
Дрюченко, М.А.
core +1 more source
A review of generative coverless image steganography based on diffusion models
Shengcai Zhang +3 more
+4 more sources
New Algorithm to Enhance the Accuracy of Extracting Steganography Hidden Data [PDF]
Cybercriminals are employing various techniques to conceal evidence from investigators, allowing them to avoid tracking the traces of the attack or the traces of crimes. Steganography of information was techniques and tactics used to hide the traces of a
Nourah Alamri, et al.
core +2 more sources

