180 related articles for article (PubMed ID: 28484623)
1. An RGB colour image steganography scheme using overlapping block-based pixel-value differencing.
Prasad S; Pal AK
R Soc Open Sci; 2017 Apr; 4(4):161066. PubMed ID: 28484623
[TBL] [Abstract][Full Text] [Related]
2. Traceable Quantum Steganography Scheme Based on Pixel Value Differencing.
Luo J; Zhou RG; Luo G; Li Y; Liu G
Sci Rep; 2019 Oct; 9(1):15134. PubMed ID: 31641209
[TBL] [Abstract][Full Text] [Related]
3. SABMIS: sparse approximation based blind multi-image steganography scheme.
Agrawal R; Ahuja K; Steinbach MC; Wick T
PeerJ Comput Sci; 2022; 8():e1080. PubMed ID: 36532802
[TBL] [Abstract][Full Text] [Related]
4. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
Hacimurtazaoglu M; Tutuncu K
PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926
[TBL] [Abstract][Full Text] [Related]
5. An efficient steganography method for hiding patient confidential information.
Al-Dmour H; Al-Ani A; Nguyen H
Annu Int Conf IEEE Eng Med Biol Soc; 2014; 2014():222-5. PubMed ID: 25569937
[TBL] [Abstract][Full Text] [Related]
6. Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images.
Pan YL; Wu JL
Entropy (Basel); 2022 Jul; 24(7):. PubMed ID: 35885204
[TBL] [Abstract][Full Text] [Related]
7. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
Al-Dmour H; Al-Ani A
Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
[TBL] [Abstract][Full Text] [Related]
8. Lossless Image Steganography Based on Invertible Neural Networks.
Liu L; Tang L; Zheng W
Entropy (Basel); 2022 Dec; 24(12):. PubMed ID: 36554167
[TBL] [Abstract][Full Text] [Related]
9. A secure steganography for privacy protection in healthcare system.
Liu J; Tang G; Sun Y
J Med Syst; 2013 Apr; 37(2):9918. PubMed ID: 23321975
[TBL] [Abstract][Full Text] [Related]
10. Steganography-based voice hiding in medical images of COVID-19 patients.
Yildirim M
Nonlinear Dyn; 2021; 105(3):2677-2692. PubMed ID: 34316095
[TBL] [Abstract][Full Text] [Related]
11. SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network.
Duan X; Liu N; Gou M; Wang W; Qin C
Entropy (Basel); 2020 Oct; 22(10):. PubMed ID: 33286909
[TBL] [Abstract][Full Text] [Related]
12. A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter-Frames Using Embedding-Based Byte Differencing (EBBD) Scheme.
Idbeaa T; Abdul Samad S; Husain H
PLoS One; 2016; 11(3):e0150732. PubMed ID: 26963093
[TBL] [Abstract][Full Text] [Related]
13. A Robust Quasi-Quantum Walks-Based Steganography Protocol for Secure Transmission of Images on Cloud-Based E-healthcare Platforms.
Abd-El-Atty B; Iliyasu AM; Alaskar H; Abd El-Latif AA
Sensors (Basel); 2020 May; 20(11):. PubMed ID: 32486383
[TBL] [Abstract][Full Text] [Related]
14. New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.
Hardan H; Alawneh A; El-Emam NN
PeerJ Comput Sci; 2022; 8():e1115. PubMed ID: 36426248
[TBL] [Abstract][Full Text] [Related]
15. Steganography in color images with random order of pixel selection and encrypted text message embedding.
Kordov K; Zhelezov S
PeerJ Comput Sci; 2021; 7():e380. PubMed ID: 33817027
[TBL] [Abstract][Full Text] [Related]
16. High-Payload Data-Hiding Method for AMBTC Decompressed Images.
Yeh JY; Chen CC; Liu PL; Huang YH
Entropy (Basel); 2020 Jan; 22(2):. PubMed ID: 33285920
[TBL] [Abstract][Full Text] [Related]
17. A high-capacity coverless image steganography method based on double-level index and block matching.
Chen XY; Qiu AQ; Sun XM; Wang S; Wei G
Math Biosci Eng; 2019 May; 16(5):4708-4722. PubMed ID: 31499685
[TBL] [Abstract][Full Text] [Related]
18. Double-Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi-Region Coverage.
Pan P; Wu Z; Yang C; Zhao B
Entropy (Basel); 2022 Feb; 24(2):. PubMed ID: 35205541
[TBL] [Abstract][Full Text] [Related]
19. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
Almomani I; Alkhayer A; El-Shafai W
Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452
[TBL] [Abstract][Full Text] [Related]
20. Random Matrix Transformation and Its Application in Image Hiding.
Wang J; Tan FS; Yuan Y
Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679814
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]