126 related articles for article (PubMed ID: 37648738)
1. A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image.
Rahman S; Uddin J; Hussain H; Ahmed A; Khan AA; Zakarya M; Rahman A; Haleem M
Sci Rep; 2023 Aug; 13(1):14183. PubMed ID: 37648738
[TBL] [Abstract][Full Text] [Related]
2. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
Hacimurtazaoglu M; Tutuncu K
PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926
[TBL] [Abstract][Full Text] [Related]
3. New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.
Hardan H; Alawneh A; El-Emam NN
PeerJ Comput Sci; 2022; 8():e1115. PubMed ID: 36426248
[TBL] [Abstract][Full Text] [Related]
4. Enhanced payload volume in the least significant bits image steganography using hash function.
Ghadi YY; AlShloul T; Nezami ZI; Ali H; Asif M; Jaward Bah M
PeerJ Comput Sci; 2023; 9():e1606. PubMed ID: 38077573
[TBL] [Abstract][Full Text] [Related]
5. A novel fuzzy logic-based image steganography method to ensure medical data security.
Karakış R; Güler I; Çapraz I; Bilir E
Comput Biol Med; 2015 Dec; 67():172-83. PubMed ID: 26555746
[TBL] [Abstract][Full Text] [Related]
6. Interval type-2 fuzzy logic system based similarity evaluation for image steganography.
Ashraf Z; Roy ML; Muhuri PK; Lohani QMD
Heliyon; 2020 May; 6(5):e03771. PubMed ID: 32420466
[TBL] [Abstract][Full Text] [Related]
7. A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.
Almomani I; Alkhayer A; El-Shafai W
Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336452
[TBL] [Abstract][Full Text] [Related]
8. A new image steganography method with optimum pixel similarity for data hiding in medical images.
Karakus S; Avci E
Med Hypotheses; 2020 Jun; 139():109691. PubMed ID: 32240879
[TBL] [Abstract][Full Text] [Related]
9. Steganography-based voice hiding in medical images of COVID-19 patients.
Yildirim M
Nonlinear Dyn; 2021; 105(3):2677-2692. PubMed ID: 34316095
[TBL] [Abstract][Full Text] [Related]
10. Double layer steganography technique using DNA sequences and images.
Aljahdali AO; Al-Harbi OA
PeerJ Comput Sci; 2023; 9():e1379. PubMed ID: 37346596
[TBL] [Abstract][Full Text] [Related]
11. An efficient and secure technique for image steganography using a hash function.
Nezami ZI; Ali H; Asif M; Aljuaid H; Hamid I; Ali Z
PeerJ Comput Sci; 2022; 8():e1157. PubMed ID: 36532801
[TBL] [Abstract][Full Text] [Related]
12. Minimal Block Knight's Tour and Edge with LSB Pixel Replacement Based Encrypted Image Steganography.
Shashikiran BS; Shaila K; Venugopal KR
SN Comput Sci; 2021; 2(3):139. PubMed ID: 33748775
[TBL] [Abstract][Full Text] [Related]
13. High-Capacity Image Steganography Based on Improved Xception.
Duan X; Gou M; Liu N; Wang W; Qin C
Sensors (Basel); 2020 Dec; 20(24):. PubMed ID: 33348833
[TBL] [Abstract][Full Text] [Related]
14. Double layer security using crypto-stego techniques: a comprehensive review.
Jan A; Parah SA; Hussan M; Malik BA
Health Technol (Berl); 2022; 12(1):9-31. PubMed ID: 34660167
[TBL] [Abstract][Full Text] [Related]
15. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy.
Muhammad K; Sajjad M; Baik SW
J Med Syst; 2016 May; 40(5):114. PubMed ID: 26995355
[TBL] [Abstract][Full Text] [Related]
16. Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem.
Jain M; Kumar A; Choudhary RC
Brain Inform; 2017 Jun; 4(2):95-106. PubMed ID: 27747825
[TBL] [Abstract][Full Text] [Related]
17. Quality optimized medical image information hiding algorithm that employs edge detection and data coding.
Al-Dmour H; Al-Ani A
Comput Methods Programs Biomed; 2016 Apr; 127():24-43. PubMed ID: 27000287
[TBL] [Abstract][Full Text] [Related]
18. Data Confidentiality in Healthcare Monitoring Systems Based on Image Steganography to Improve the Exchange of Patient Information Using the Internet of Things.
AlEisa HN
J Healthc Eng; 2022; 2022():7528583. PubMed ID: 35571336
[TBL] [Abstract][Full Text] [Related]
19. An optimal and efficient data security technique through crypto-stegano for E-commerce.
Kumbhakar D; Sanyal K; Karforma S
Multimed Tools Appl; 2023; 82(14):21005-21018. PubMed ID: 36778718
[TBL] [Abstract][Full Text] [Related]
20. Seek-and-Hide: Adversarial Steganography via Deep Reinforcement Learning.
Pan W; Yin Y; Wang X; Jing Y; Song M
IEEE Trans Pattern Anal Mach Intell; 2022 Nov; 44(11):7871-7884. PubMed ID: 34550880
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]