Cargando…

Comparative performance assessment of deep learning based image steganography techniques

Increasing data infringement while transmission and storage have become an apprehension for the data owners. Even the digital images transmitted over the network or stored at servers are prone to unauthorized access. However, several image steganography techniques were proposed in the literature for...

Descripción completa

Detalles Bibliográficos
Autores principales: Himthani, Varsha, Dhaka, Vijaypal Singh, Kaur, Manjit, Rani, Geeta, Oza, Meet, Lee, Heung-No
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9546933/
https://www.ncbi.nlm.nih.gov/pubmed/36207314
http://dx.doi.org/10.1038/s41598-022-17362-1