139 related articles for article (PubMed ID: 36759703)
21. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
Al-Dmour H; Al-Ani A
Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
[TBL] [Abstract][Full Text] [Related]
22. Double layer steganography technique using DNA sequences and images.
Aljahdali AO; Al-Harbi OA
PeerJ Comput Sci; 2023; 9():e1379. PubMed ID: 37346596
[TBL] [Abstract][Full Text] [Related]
23. Double layer security using crypto-stego techniques: a comprehensive review.
Jan A; Parah SA; Hussan M; Malik BA
Health Technol (Berl); 2022; 12(1):9-31. PubMed ID: 34660167
[TBL] [Abstract][Full Text] [Related]
24. Steganography in color images with random order of pixel selection and encrypted text message embedding.
Kordov K; Zhelezov S
PeerJ Comput Sci; 2021; 7():e380. PubMed ID: 33817027
[TBL] [Abstract][Full Text] [Related]
25. Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images.
Pan YL; Wu JL
Entropy (Basel); 2022 Jul; 24(7):. PubMed ID: 35885204
[TBL] [Abstract][Full Text] [Related]
26. Hiding Information in Digital Images Using Ant Algorithms.
Boryczka M; Kazana G
Entropy (Basel); 2023 Jun; 25(7):. PubMed ID: 37509910
[TBL] [Abstract][Full Text] [Related]
27. Composition-Aware Image Steganography Through Adversarial Self-Generated Supervision.
Zheng Z; Hu Y; Bin Y; Xu X; Yang Y; Shen HT
IEEE Trans Neural Netw Learn Syst; 2023 Nov; 34(11):9451-9465. PubMed ID: 35679383
[TBL] [Abstract][Full Text] [Related]
28. Statistical model of quantized DCT coefficients: application in the steganalysis of Jsteg algorithm.
Thai TH; Cogranne R; Retraint F
IEEE Trans Image Process; 2014 May; 23(5):1980-93. PubMed ID: 24710399
[TBL] [Abstract][Full Text] [Related]
29. Multilayer Reversible Information Hiding with Prediction-Error Expansion and Dynamic Threshold Analysis.
Pan IH; Huang PS; Chang TJ; Chen HH
Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808367
[TBL] [Abstract][Full Text] [Related]
30. Three-Dimensional Mesh Steganography and Steganalysis: A Review.
Zhou H; Zhang W; Chen K; Li W; Yu N
IEEE Trans Vis Comput Graph; 2022 Dec; 28(12):5006-5025. PubMed ID: 33886472
[TBL] [Abstract][Full Text] [Related]
31. Steganography and Steganalysis in Voice over IP: A Review.
Wu Z; Guo J; Zhang C; Li C
Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33546240
[TBL] [Abstract][Full Text] [Related]
32. Interval type-2 fuzzy logic system based similarity evaluation for image steganography.
Ashraf Z; Roy ML; Muhuri PK; Lohani QMD
Heliyon; 2020 May; 6(5):e03771. PubMed ID: 32420466
[TBL] [Abstract][Full Text] [Related]
33. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
Almomani I; Alkhayer A; El-Shafai W
Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452
[TBL] [Abstract][Full Text] [Related]
34. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy.
Muhammad K; Sajjad M; Baik SW
J Med Syst; 2016 May; 40(5):114. PubMed ID: 26995355
[TBL] [Abstract][Full Text] [Related]
35. Selection of Robust and Relevant Features for 3-D Steganalysis.
Li Z; Bors AG
IEEE Trans Cybern; 2020 May; 50(5):1989-2001. PubMed ID: 30571650
[TBL] [Abstract][Full Text] [Related]
36. Bio-inspired dimensionality reduction for Parkinson's disease (PD) classification.
Pasha A; Latha PH
Health Inf Sci Syst; 2020 Dec; 8(1):13. PubMed ID: 32206309
[TBL] [Abstract][Full Text] [Related]
37. An efficient and secure technique for image steganography using a hash function.
Nezami ZI; Ali H; Asif M; Aljuaid H; Hamid I; Ali Z
PeerJ Comput Sci; 2022; 8():e1157. PubMed ID: 36532801
[TBL] [Abstract][Full Text] [Related]
38. Gray wolf optimization-extreme learning machine approach for diabetic retinopathy detection.
Albadr MAA; Ayob M; Tiun S; Al-Dhief FT; Hasan MK
Front Public Health; 2022; 10():925901. PubMed ID: 35979449
[TBL] [Abstract][Full Text] [Related]
39. SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network.
Duan X; Liu N; Gou M; Wang W; Qin C
Entropy (Basel); 2020 Oct; 22(10):. PubMed ID: 33286909
[TBL] [Abstract][Full Text] [Related]
40. Particle Swarm Optimized Hybrid Kernel-Based Multiclass Support Vector Machine for Microarray Cancer Data Analysis.
Segera D; Mbuthia M; Nyete A
Biomed Res Int; 2019; 2019():4085725. PubMed ID: 31998772
[TBL] [Abstract][Full Text] [Related]
[Previous] [Next] [New Search]