Results 21 to 30 of about 8,449 (218)
JPEG steganography: A performance evaluation of quantization tables [PDF]
The two most important aspects of any image based steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and efficiency of using optimized quantization tables instead of default JPEG ...
Al-Mohammad, A, Ghinea, G, Hierons, RM
core +1 more source
Perception of the Divine Essence from Ayatollah Javadi Amoli's Viewpoint [PDF]
The perception of the Divine essence is challenging in Islamic mysticism and philosophy. Ayatollah Javadi Amoli has a unique view on this subject matter, which has not yet been the topic of an independent study.
Rouhollah Souri
doaj +1 more source
Digital image steganography and steganalysis: A journey of the past three decades
Steganography is the science and art of covert communication. Conversely, steganalysis is the study of uncovering the steganographic process. The evolution of steganography has been paralleled by the development of steganalysis.
Sahu Aditya Kumar, Sahu Monalisa
doaj +1 more source
A New Video Steganography Scheme Based on Shi-Tomasi Corner Detector
Recent developments in the speed of the Internet and information technology have made the rapid exchange of multimedia information possible. However, these developments in technology lead to violations of information security and private information ...
Ramadhan J. Mstafa +3 more
doaj +1 more source
The existence of a trade-off between embedding capacity and imperceptibility is a challenge to improve the quality of steganographic images. This research proposes to cross diagonal embedding Pixel Value Differencing (PVD) and Modulus Function (MF ...
Rustad Supriadi +4 more
doaj +1 more source
In the past decade, rapid development in digital communication has led to prevalent use of digital images. More importantly, confidentiality issues have also come up recently due to the increase in digital image transmission across the Internet ...
Priyanka Singh +3 more
doaj +1 more source
The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices
Abdelrahim, Elsaid MD. +1 more
core +1 more source
A review on medicinal properties of saffron toward major diseases [PDF]
The stigma of Crocus sativus, known as saffron, is one of the most expensive spices in the world. The bioactive components in saffron, picrocrocin, crocin, and safranal, have demonstrated a wide range of uses and capabilities in the medical field.
Abd Razak, Saiful Izwan +4 more
core +2 more sources
Deep Learning-Based Image Watermarking Using Catalan Transform and Non-Negative Matrix Factorization
In the digital age, embedding imperceptible data into images for authenticating ownership and content integrity through watermarking has gained immense importance.
Md. Fahim Hossain Saikat +4 more
doaj +1 more source
High-Capacity Image Steganography Based on Discrete Hadamard Transform
High capacity and high imperceptibility are the primary targets for ideal image steganography. For the traditional transform-based schemes, the main challenge is to balance the imperceptibility, hiding capacity, and running efficiency.
Ying-Qian Zhang +2 more
doaj +1 more source

