122 related articles for article (PubMed ID: 38413801)
1. Security-oriented steganographic payload allocation for multi-remote sensing images.
Wu T; Hu X; Liu C
Sci Rep; 2024 Feb; 14(1):4826. PubMed ID: 38413801
[TBL] [Abstract][Full Text] [Related]
2. Steganography and Steganalysis in Voice over IP: A Review.
Wu Z; Guo J; Zhang C; Li C
Sensors (Basel); 2021 Feb; 21(4):. PubMed ID: 33546240
[TBL] [Abstract][Full Text] [Related]
3. Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors.
Battikh D; El Assad S; Hoang TM; Bakhache B; Deforges O; Khalil M
Entropy (Basel); 2019 Jul; 21(8):. PubMed ID: 33267462
[TBL] [Abstract][Full Text] [Related]
4. SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network.
Duan X; Liu N; Gou M; Wang W; Qin C
Entropy (Basel); 2020 Oct; 22(10):. PubMed ID: 33286909
[TBL] [Abstract][Full Text] [Related]
5. SABMIS: sparse approximation based blind multi-image steganography scheme.
Agrawal R; Ahuja K; Steinbach MC; Wick T
PeerJ Comput Sci; 2022; 8():e1080. PubMed ID: 36532802
[TBL] [Abstract][Full Text] [Related]
6. JPEG Steganography With Content Similarity Evaluation.
Wang Z; Feng G; Qian Z; Zhang X
IEEE Trans Cybern; 2023 Aug; 53(8):5082-5093. PubMed ID: 35580096
[TBL] [Abstract][Full Text] [Related]
7. Enhanced payload volume in the least significant bits image steganography using hash function.
Ghadi YY; AlShloul T; Nezami ZI; Ali H; Asif M; Jaward Bah M
PeerJ Comput Sci; 2023; 9():e1606. PubMed ID: 38077573
[TBL] [Abstract][Full Text] [Related]
8. New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.
Hardan H; Alawneh A; El-Emam NN
PeerJ Comput Sci; 2022; 8():e1115. PubMed ID: 36426248
[TBL] [Abstract][Full Text] [Related]
9. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix.
Hacimurtazaoglu M; Tutuncu K
PeerJ Comput Sci; 2022; 8():e843. PubMed ID: 35111926
[TBL] [Abstract][Full Text] [Related]
10. RED-Net: Residual and Enhanced Discriminative Network for Image Steganalysis in the Internet of Medical Things and Telemedicine.
Chen K; Zhou Z; Li Y; Ji X; Wu J; Coatrieux JL; Chen Y; Coatrieux G
IEEE J Biomed Health Inform; 2024 Mar; 28(3):1611-1622. PubMed ID: 37721892
[TBL] [Abstract][Full Text] [Related]
11. Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images.
Pan YL; Wu JL
Entropy (Basel); 2022 Jul; 24(7):. PubMed ID: 35885204
[TBL] [Abstract][Full Text] [Related]
12. Synchronization of Acoustic Signals for Steganographic Transmission.
WojtuĆ J; Piotrowski Z
Sensors (Basel); 2021 May; 21(10):. PubMed ID: 34066251
[TBL] [Abstract][Full Text] [Related]
13. Random embedded calibrated statistical blind steganalysis using cross validated support vector machine and support vector machine with particle swarm optimization.
Shankar DD; Azhakath AS
Sci Rep; 2023 Feb; 13(1):2359. PubMed ID: 36759703
[TBL] [Abstract][Full Text] [Related]
14. An Enhanced Steganography Network for Concealing and Protecting Secret Image Data.
Chen F; Xing Q; Sun B; Yan X; Cheng J
Entropy (Basel); 2022 Aug; 24(9):. PubMed ID: 36141089
[TBL] [Abstract][Full Text] [Related]
15. Steganography using reversible texture synthesis.
Wu KC; Wang CM
IEEE Trans Image Process; 2015 Jan; 24(1):130-9. PubMed ID: 25415988
[TBL] [Abstract][Full Text] [Related]
16. Steganography in beautified images.
Liu LY; Wang ZC; Qian ZX; Zhang XP; Feng GR
Math Biosci Eng; 2019 Mar; 16(4):2322-2333. PubMed ID: 31137215
[TBL] [Abstract][Full Text] [Related]
17. Composition-Aware Image Steganography Through Adversarial Self-Generated Supervision.
Zheng Z; Hu Y; Bin Y; Xu X; Yang Y; Shen HT
IEEE Trans Neural Netw Learn Syst; 2023 Nov; 34(11):9451-9465. PubMed ID: 35679383
[TBL] [Abstract][Full Text] [Related]
18. ASSAF: Advanced and Slim StegAnalysis Detection Framework for JPEG images based on deep convolutional denoising autoencoder and Siamese networks.
Cohen A; Cohen A; Nissim N
Neural Netw; 2020 Nov; 131():64-77. PubMed ID: 32759032
[TBL] [Abstract][Full Text] [Related]
19. Interval type-2 fuzzy logic system based similarity evaluation for image steganography.
Ashraf Z; Roy ML; Muhuri PK; Lohani QMD
Heliyon; 2020 May; 6(5):e03771. PubMed ID: 32420466
[TBL] [Abstract][Full Text] [Related]
20. A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image.
Rahman S; Uddin J; Hussain H; Ahmed A; Khan AA; Zakarya M; Rahman A; Haleem M
Sci Rep; 2023 Aug; 13(1):14183. PubMed ID: 37648738
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]