Results 41 to 50 of about 390 (143)

A SURVEY PAPER ON AUTOMATED ELECTRONIC TOLLING SYSTEMS USING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY [PDF]

open access: yes, 2022
Purpose: In this paper we carry out a review on Automated e-tolling systems using RFID technology that has already been proposed by other researchers.
Nhapi, Lincoln, Phiri, Misheck
core   +2 more sources

An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest–Shamir–Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algorithm, and the key stream is produced iteratively.
Riguang Lin, Sheng Li, Zhiyuan Tan
wiley   +1 more source

StyleGAN2-Stego: Secure Coverless Image Steganography via Latent Space Encoding

open access: hybridEast Journal of Computer Science
Coverless image steganography (CIS) enhances secrecy by avoiding direct modifications to existing images, unlike traditional methods that embed data by altering image content. However, many existing approaches struggle to balance payload capacity, visual quality, and resistance to steganalysis.
Ari Ibrahim Hamid   +1 more
openalex   +3 more sources

A video coverless information hiding algorithm based on semantic segmentation

open access: yesEURASIP Journal on Image and Video Processing, 2020
Due to the fact that coverless information hiding can effectively resist the detection of steganalysis tools, it has attracted more attention in the field of information hiding.
Nan Pan   +4 more
doaj   +1 more source

End-to-end image steganography using deep convolutional autoencoders [PDF]

open access: yes, 2021
Image steganography is used to hide a secret image inside a cover image in plain sight. Traditionally, the secret data is converted into binary bits and the cover image is manipulated statistically to embed the secret binary bits.
Al-Maadeed, S   +4 more
core   +2 more sources

Steganography Using Reversible Texture Synthesis Based on Seeded Region Growing and LSB [PDF]

open access: yes, 2018
Steganography technology has been widely used in data transmission with secret information. However, the existing steganography has the disadvantages of low hidden information capacity, poor visual effect of cover images, and is hard to guarantee ...
Jianfeng Lu   +6 more
core   +2 more sources

Coverless Information Hiding Based on the Molecular Structure Images of Material [PDF]

open access: yes, 2018
The traditional information hiding methods embed the secret information by modifying the carrier, which will inevitably leave traces of modification on the carrier. In this way, it is hard to resist the detection of steganalysis algorithm.
Chongzhi Gao   +3 more
core   +2 more sources

An adaptive image steganography algorithm based on the use of non-cryptographic hash functions for data extraction [PDF]

open access: yes, 2023
Рассматривается адаптивный алгоритм стеганографического скрытия информации, основанный на итеративном внесении малозначительных искажений в блоки полноцветных изображений-контейнеров и использующий быстродействующие некриптографические хеш-функции для ...
Дрюченко, М.А.
core   +1 more source

New Algorithm to Enhance the Accuracy of Extracting Steganography Hidden Data [PDF]

open access: yes, 2023
Cybercriminals are employing various techniques to conceal evidence from investigators, allowing them to avoid tracking the traces of the attack or the traces of crimes. Steganography of information was techniques and tactics used to hide the traces of a
Nourah Alamri, et al.
core   +2 more sources

Home - About - Disclaimer - Privacy