Cargando…
Double layer security using crypto-stego techniques: a comprehensive review
Recent advancement in the digital technology and internet has facilitated usage of multimedia objects for data communication. However, interchanging information through the internet raises several security concerns and needs to be addressed. Image steganography has gained huge attention from researc...
Autores principales: | Jan, Aiman, Parah, Shabir A., Hussan, Muzamil, Malik, Bilal A. |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer Berlin Heidelberg
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8512592/ https://www.ncbi.nlm.nih.gov/pubmed/34660167 http://dx.doi.org/10.1007/s12553-021-00602-1 |
Ejemplares similares
-
IEFHAC: Image encryption framework based on hessenberg transform and chaotic theory for smart health
por: Jan, Aiman, et al.
Publicado: (2022) -
Stego on FPGA: An IWT Approach
por: Ramalingam, Balakrishnan, et al.
Publicado: (2014) -
Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images
por: Pan, Yi-Lun, et al.
Publicado: (2022) -
Secure Patient Data Transfer Using Information Embedding and Hyperchaos
por: Aljuaid, Hanan, et al.
Publicado: (2021) -
StegoFrameOrder—MAC Layer Covert Network Channel for Wireless IEEE 802.11 Networks
por: Sawicki, Krzysztof, et al.
Publicado: (2021)