• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
Number Citation Analysis
1
Priya S, Abirami SP, Arunkumar B, Mishachandar B. Super-resolution deep neural network (SRDNN) based multi-image steganography for highly secured lossless image transmission. Sci Rep 2024;14:6104. [PMID: 38480860 PMCID: PMC10937672 DOI: 10.1038/s41598-024-54839-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/25/2023] [Accepted: 02/17/2024] [Indexed: 03/17/2024]  Open
2
Li Z, Yang X, Shen K, Jiang F, Jiang J, Ren H, Li Y. Adversarial feature hybrid framework for steganography with shifted window local loss. Neural Netw 2023;165:358-369. [PMID: 37329780 DOI: 10.1016/j.neunet.2023.05.053] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/17/2022] [Revised: 05/09/2023] [Accepted: 05/28/2023] [Indexed: 06/19/2023]
3
Aljahdali AO, Al-Harbi OA. Double layer steganography technique using DNA sequences and images. PeerJ Comput Sci 2023;9:e1379. [PMID: 37346596 PMCID: PMC10280544 DOI: 10.7717/peerj-cs.1379] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/13/2022] [Accepted: 04/13/2023] [Indexed: 06/23/2023]
4
Chatterjee P, Bose R, Banerjee S, Roy S. Enhancing Data Security of Cloud Based LMS. Wirel Pers Commun 2023;130:1123-1139. [PMID: 37168441 PMCID: PMC10023308 DOI: 10.1007/s11277-023-10323-5] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 02/25/2023] [Indexed: 05/13/2023]
5
Chowdhuri P, Pal P, Si T. A novel steganographic technique for medical image using SVM and IWT. Multimed Tools Appl 2023;82:20497-20516. [PMID: 36628353 PMCID: PMC9816520 DOI: 10.1007/s11042-022-14301-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 05/25/2022] [Revised: 11/11/2022] [Accepted: 12/10/2022] [Indexed: 06/17/2023]
6
Agrawal R, Ahuja K, Steinbach MC, Wick T. SABMIS: sparse approximation based blind multi-image steganography scheme. PeerJ Comput Sci 2022;8:e1080. [PMID: 36532802 PMCID: PMC9748825 DOI: 10.7717/peerj-cs.1080] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/22/2021] [Accepted: 08/08/2022] [Indexed: 06/17/2023]
7
Çiftci E, Sümer E. A novel steganography method for binary and color halftone images. PeerJ Comput Sci 2022;8:e1062. [PMID: 36091978 PMCID: PMC9455272 DOI: 10.7717/peerj-cs.1062] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/28/2022] [Accepted: 07/18/2022] [Indexed: 06/15/2023]
8
Magdy M, Hosny KM, Ghali NI, Ghoniemy S. Security of medical images for telemedicine: a systematic review. Multimed Tools Appl 2022;81:25101-25145. [PMID: 35342327 PMCID: PMC8938747 DOI: 10.1007/s11042-022-11956-7] [Citation(s) in RCA: 4] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 06/29/2021] [Revised: 12/23/2021] [Accepted: 01/03/2022] [Indexed: 06/14/2023]
9
Hacimurtazaoglu M, Tutuncu K. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix. PeerJ Comput Sci 2022;8:e843. [PMID: 35111926 PMCID: PMC8771781 DOI: 10.7717/peerj-cs.843] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/13/2021] [Accepted: 12/15/2021] [Indexed: 06/14/2023]
10
Mawgoud AA, Taha MHN, Abu-Talleb A, Kotb A. A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system. J Cloud Comput (Heidelb) 2022;11:97. [PMID: 36569183 PMCID: PMC9768783 DOI: 10.1186/s13677-022-00339-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 03/31/2022] [Accepted: 10/01/2022] [Indexed: 12/24/2022]
11
Jan A, Parah SA, Hussan M, Malik BA. Double layer security using crypto-stego techniques: a comprehensive review. Health Technol (Berl) 2021;:1-23. [PMID: 34660167 DOI: 10.1007/s12553-021-00602-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/03/2021] [Accepted: 09/20/2021] [Indexed: 11/29/2022]
12
Tabares-Soto R, Arteaga-Arteaga HB, Mora-Rubio A, Bravo-Ortíz MA, Arias-Garzón D, Alzate-Grisales JA, Orozco-Arias S, Isaza G, Ramos-Pollán R. Sensitivity of deep learning applied to spatial image steganalysis. PeerJ Comput Sci 2021;7:e616. [PMID: 34604512 PMCID: PMC8444093 DOI: 10.7717/peerj-cs.616] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/14/2021] [Accepted: 06/09/2021] [Indexed: 05/15/2023]
13
Nagm A, Safy Elwan M. Protection of the patient data against intentional attacks using a hybrid robust watermarking code. PeerJ Comput Sci 2021;7:e400. [PMID: 33834095 PMCID: PMC8022583 DOI: 10.7717/peerj-cs.400] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/14/2020] [Accepted: 01/29/2021] [Indexed: 06/12/2023]
14
Shashikiran BS, Shaila K, Venugopal KR. Minimal Block Knight's Tour and Edge with LSB Pixel Replacement Based Encrypted Image Steganography. SN Comput Sci 2021;2:139. [PMID: 33748775 PMCID: PMC7955696 DOI: 10.1007/s42979-021-00542-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/12/2020] [Accepted: 02/23/2021] [Indexed: 06/12/2023]
15
Kordov K, Zhelezov S. Steganography in color images with random order of pixel selection and encrypted text message embedding. PeerJ Comput Sci 2021;7:e380. [PMID: 33817027 PMCID: PMC7924441 DOI: 10.7717/peerj-cs.380] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/14/2020] [Accepted: 01/10/2021] [Indexed: 06/12/2023]
16
Mohsin AH, Zaidan AA, Zaidan BB, Mohammed KI, Albahri OS, Albahri AS, Alsalem MA. PSO-Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture. Multimed Tools Appl 2021;80:14137-14161. [PMID: 33519293 PMCID: PMC7821848 DOI: 10.1007/s11042-020-10284-y] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/29/2019] [Revised: 09/17/2020] [Accepted: 12/22/2020] [Indexed: 05/02/2023]
17
Yildirim M. Steganography-based voice hiding in medical images of COVID-19 patients. Nonlinear Dyn 2021;105:2677-2692. [PMID: 34316095 PMCID: PMC8297434 DOI: 10.1007/s11071-021-06700-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/12/2021] [Accepted: 07/02/2021] [Indexed: 05/04/2023]
18
Cohen A, Cohen A, Nissim N. ASSAF: Advanced and Slim StegAnalysis Detection Framework for JPEG images based on deep convolutional denoising autoencoder and Siamese networks. Neural Netw 2020;131:64-77. [PMID: 32759032 DOI: 10.1016/j.neunet.2020.07.022] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/04/2019] [Revised: 05/18/2020] [Accepted: 07/16/2020] [Indexed: 11/22/2022]
19
Karakus S, Avci E. A new image steganography method with optimum pixel similarity for data hiding in medical images. Med Hypotheses 2020;139:109691. [PMID: 32240879 DOI: 10.1016/j.mehy.2020.109691] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/16/2020] [Revised: 03/14/2020] [Accepted: 03/23/2020] [Indexed: 10/24/2022]
20
Jarusek R, Volna E, Kotyrba M. Photomontage detection using steganography technique based on a neural network. Neural Netw 2019;116:150-165. [PMID: 31063925 DOI: 10.1016/j.neunet.2019.03.015] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/24/2018] [Revised: 03/19/2019] [Accepted: 03/23/2019] [Indexed: 11/30/2022]
21
Mohsin AH, Zaidan AA, Zaidan BB, Albahri OS, Albahri AS, Alsalem MA, Mohammed KI. Based Medical Systems for Patient's Authentication: Towards a New Verification Secure Framework Using CIA Standard. J Med Syst 2019;43:192. [PMID: 31115768 DOI: 10.1007/s10916-019-1264-y] [Citation(s) in RCA: 23] [Impact Index Per Article: 4.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/16/2018] [Accepted: 03/27/2019] [Indexed: 01/14/2023]
22
Mohsin AH, Zaidan AA, Zaidan BB, Ariffin SAB, Albahri OS, Albahri AS, Alsalem MA, Mohammed KI, Hashim M. Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review. J Med Syst 2018;42:245. [PMID: 30374820 DOI: 10.1007/s10916-018-1103-6] [Citation(s) in RCA: 37] [Impact Index Per Article: 6.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/01/2018] [Accepted: 10/09/2018] [Indexed: 11/26/2022]
23
Shiu HJ, Lin BS, Huang CH, Chiang PY, Chiang PY, Lei CL. Preserving privacy of online digital physiological signals using blind and reversible steganography. Comput Methods Programs Biomed 2017;151:159-170. [PMID: 28946998 DOI: 10.1016/j.cmpb.2017.08.015] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/17/2017] [Revised: 07/18/2017] [Accepted: 08/21/2017] [Indexed: 06/07/2023]
24
Jain M, Kumar A, Choudhary RC. Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem. Brain Inform 2016;4:95-106. [PMID: 27747825 PMCID: PMC5413591 DOI: 10.1007/s40708-016-0057-z] [Citation(s) in RCA: 15] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/04/2016] [Accepted: 08/29/2016] [Indexed: 11/30/2022]  Open
25
Muhammad K, Sajjad M, Baik SW. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy. J Med Syst 2016;40:114. [PMID: 26995355 DOI: 10.1007/s10916-016-0473-x] [Citation(s) in RCA: 56] [Impact Index Per Article: 7.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/09/2016] [Accepted: 03/07/2016] [Indexed: 01/02/2023]
26
Jain M, Lenka SK. Diagonal queue medical image steganography with Rabin cryptosystem. Brain Inform 2016;3:39-51. [PMID: 27747599 PMCID: PMC4883164 DOI: 10.1007/s40708-016-0032-8] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/21/2015] [Accepted: 01/08/2016] [Indexed: 11/29/2022]  Open
27
Rosemeyer H, Paululat A, Heinisch JJ. 'Yeast mail': a novel Saccharomyces application (NSA) to encrypt messages. Chem Biodivers 2014;11:1364-73. [PMID: 25238077 DOI: 10.1002/cbdv.201400160] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/23/2014] [Indexed: 11/10/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA