Article
Computer Science, Artificial Intelligence
Ilyas Benkhaddra, Abhishek Kumar, Zine El Abidine Bensalem, Lei Hang
Summary: This research focuses on achieving secure transmission of data through steganography images by embedding and transmitting secret data in the optimal location of the network to prevent unauthorized access. The proposed method utilizes discrete wavelet transform for image transformation and inverse discrete wavelet transform for image reconstruction. The performance of the method is evaluated using correlation coefficient and PSNR as performance metrics.
EXPERT SYSTEMS WITH APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Faiza Al-Shaarani, Adnan Gutub
Summary: The privacy and confidentiality of data are crucial, and traditional security measures are no longer sufficient. Secret sharing schemes, focusing on counting-based and matrix-based techniques, provide dual security through steganography and cryptography.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Computer Science, Information Systems
Osama Fouad Abdel Wahab, Ashraf A. M. Khalaf, Aziza I. Hussein, Hesham F. A. Hamed
Summary: Data compression is crucial for information security as it enhances data security and efficiency. It can be classified into lossy and lossless algorithms, applicable to various data formats for efficient transmission and confidentiality.
Article
Computer Science, Information Systems
Oleg Evsutin, Pavel Kultaev
Summary: This paper presents a new algorithm for embedding information in the frequency domain of the discrete wavelet-transform (DWT) of digital images. The algorithm adapts the data block size depending on the local properties of the cover image to optimize embedding quality. Using a computing model of learning automata, the algorithm solves the problem of optimizing distortions in the DWT coefficients for improved quality of embedding.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Asha Durafe, Vinod Patidar
Summary: This paper proposes a robust and blind color image steganography algorithm using fractal cover images, SVD, IWT, and DWT. The algorithm achieves high hiding capacity and security, and the experimental results validate its effectiveness.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Computer Science, Information Systems
Zeyad Safaa Younus, Mohammed Khaire Hussain
Summary: A novel steganography approach using Vigenere Cipher and Huffman Coding methods is proposed to enhance security and protect message content. The outcomes show that the suggested scheme is more efficient in terms of PSNR, payload, and robustness compared to traditional steganography schemes.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Multidisciplinary Sciences
Faiza Al-Shaarani, Adnan Gutub
Summary: This study investigates two specific secret sharing techniques, addressing the challenge of participants' memorization through image steganography, and compares the practicality of different methods, showing that the matrix-based scheme performs highly satisfactory.
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING
(2022)
Review
Computer Science, Artificial Intelligence
Mohd Arif Wani, Bisma Sultan
Summary: This paper presents a review of deep learning based image steganography techniques, along with a brief discussion of traditional steganography techniques. It describes the three key parameters (security, embedding capacity, and invisibility) used to measure the quality of image steganography techniques. Various steganography techniques are reviewed based on these parameters, classified into three main categories: Traditional, Hybrid, and fully Deep Learning, with further sub-categories under each.
WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY
(2022)
Article
Physics, Multidisciplinary
Colince Welba, Thierry Simo, Alexendre Noura, Pascal Eloundou Ntsama, Pierre Ele
Summary: This paper presents a lossy compression method for noisy images, which utilizes partial differential equations (PDEs) as an image preprocessing filter to improve the performance of noisy image compression algorithms and demonstrates the advantages of applying a restoration filter before compressing noise images. The method involves applying the preprocessing filter to the noisy image, comparing the results with those in the scientific literature on restoration of noisy images, and then submitting the filtered image to a compression algorithm (DWT + SPIHT + HUFFMAN). The simulation results show that the proposed technique is as efficient as existing approaches for picture compression and/or image restoration.
Article
Computer Science, Hardware & Architecture
V. K. Reshma, Vinod R. S. Kumar
Summary: By introducing a novel pixel prediction scheme based on support vector neural network, this research overcomes the complexity issues in existing works, and enhances the privacy protection performance of medical image steganography.
Article
Engineering, Multidisciplinary
Pratik D. Shah, Rajankumar S. Bichkar
Summary: This paper introduces a high-capacity image steganography technique based on genetic algorithm (GA), which rearranges and modifies secret data using GA-controlled parameters before embedding it in the least significant bits (LSBs) of the cover image to improve visual quality and payload capacity.
ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH
(2021)
Article
Physics, Multidisciplinary
Rajiv Ranjan, Prabhat Kumar
Summary: Image compression has become crucial due to the need for faster encoding and decoding. In this study, a hybrid compression model combining discrete wavelet transform, principal component analysis, and canonical Huffman coding is proposed. The proposed technique achieves high compression rates while maintaining high visual quality, outperforming currently available techniques in terms of PSNR and bpp scores.
Article
Computer Science, Artificial Intelligence
Qichao Ying, Hang Zhou, Zhenxing Qian, Sheng Li, Xinpeng Zhang
Summary: This paper presents an enhanced scheme for image immunization called Imuge+, which uses an invertible neural network to learn image immunization and recovery. The proposed distillation-based JPEG simulator improves robustness. Experimental results show accurate tamper localization and high-fidelity content recovery.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
(2023)
Article
Computer Science, Information Systems
Fatuma Saeid Hassan, Adnan Gutub
Summary: This paper proposes an interpolation-based reversible data hiding (RDH) method to improve embedding capacity and security. Experimental results demonstrate that the proposed quadratic Bezier interpolation technique reduces computational complexity while maintaining image quality.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Review
Engineering, Electrical & Electronic
De Rosal Ignatius Moses Setiadi, Supriadi Rustad, Pulung Nurtantio Andono, Guruh Fajar Shidik
Summary: Digital steganography, developed since the 90s, focuses on security, imperceptibility, and payload. It utilizes various methods such as adaptive techniques, machine learning, artificial intelligence, GAN, CNN, coverless techniques, etc., and now includes robustness as an important aspect. However, there is a lack of explicit classification of steganography based on its goals. This survey aims to provide a classification based on goals, assess the use of assessment tools, review challenges and developments, and enhance understanding of image steganography for novice researchers.
Article
Computer Science, Artificial Intelligence
Deepika Kumar, Usha Batra
Summary: Breast cancer is a major global threat, and machine learning algorithms show great potential in its classification, especially in detecting cancer through histopathological images for more accurate results.
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
(2021)
Article
Materials Science, Multidisciplinary
Shubham Verma, Joy Prakash Misra, Jaspreet Singh, Usha Batra, Yogesh Kumar
Summary: The study applies machine learning methods to analyze and predict the tensile behavior of friction stir welded AA7039, finding that the artificial neural network model performs the best for prediction with minimum RMSE and maximum CC values, while the linear regression model shows poor performance. Additionally, grain size measurements were conducted using electron backscattered diffraction.
MATERIALS TODAY COMMUNICATIONS
(2021)
Article
Multidisciplinary Sciences
Anupam Tiwari, Usha Batra
Summary: Blockchain technology is rapidly evolving globally, not only associated with bitcoin and finance, but also widely used in various fields, including smart buildings. Smart buildings use the internet of things, sensors, and cloud connectivity to improve efficiency and sustainability, and there is great growth potential in the future.
DEFENCE SCIENCE JOURNAL
(2021)
Article
Engineering, Electrical & Electronic
Neha Sharma, Chinmay Chakraborty
Summary: This study aims to identify the optimization algorithms used in image steganography after data embedding, and improve the quality of steganography through evaluating performance metrics.
JOURNAL OF ELECTRONIC IMAGING
(2022)
Article
Materials Science, Multidisciplinary
Shubham Verma, Velaphi Msomi, Sipokazi Mabuwa, Ali Merdji, Joy Prakash Misra, Usha Batra, Sandeep Sharma
Summary: This paper employs machine learning techniques to predict the tensile behavior of friction stir processed dissimilar aluminium alloys joints, with support vector machine_radial basis function kernel as the most accurate modeling technique. The use of optical microscope shows that FSP samples with the smallest grain size correspond to high ultimate tensile strength, with fractographic analysis indicating ductile behavior.
PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART L-JOURNAL OF MATERIALS-DESIGN AND APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Neha Sharma, Chinmay Chakraborty, Rajeev Kumar
Summary: In the field of data exchange, ensuring information security is crucial. Steganography, combined with cryptography, has been used to achieve better and advanced levels of security, especially in highly critical information exchange. This paper proposes an image steganography method in the transform domain using a combination of two computationally intelligent algorithms, firefly optimization algorithm and ant colony optimization algorithm, with Huffman encoding to address the issue of high payload. Comparative analysis shows that the proposed algorithm is a powerful method.
MULTIMEDIA SYSTEMS
(2023)
Article
Computer Science, Artificial Intelligence
Neha Sharma, Mukesh Soni, Sumit Kumar, Rajeev Kumar, Nabamita Deb, Anurag Shrivastava
Summary: Asian social networks play a crucial role in providing enhanced and real-time data mapping, as well as accessing diverse big data sources. The concept of sentiment analysis helps in understanding textual content in relation to the stock market. An intelligent ontology and knowledge-based Asian social network solution can improve decision making by extracting important information. This article focuses on predicting stock market news sentiments using ontological knowledge-based Convolution Neural Network (CNN) and swarm-based Artificial Bee Colony (ABC) algorithm.
ACM TRANSACTIONS ON ASIAN AND LOW-RESOURCE LANGUAGE INFORMATION PROCESSING
(2023)
Proceedings Paper
Computer Science, Artificial Intelligence
Anupam Tiwari, Usha Batra
Summary: Global health security has become increasingly important due to the outbreak of COVID-19. The interconnectedness of countries and states has led to the rapid spread of pandemics. A unified and robust medical system is needed to address this global need. This paper proposes a blockchain-based model to address challenges faced by medical cyber-physical systems and enables the sharing of encrypted data on select blockchain nodes.
ADVANCES IN COMPUTING AND DATA SCIENCES (ICACDS 2022), PT II
(2022)
Proceedings Paper
Computer Science, Artificial Intelligence
Neha Sharma, Usha Batra, Sherin Zafar
PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY
(2020)
Proceedings Paper
Computer Science, Artificial Intelligence
Neha Sharma, Usha Batra, Sherin Zafar
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE
(2020)
Review
Computer Science, Information Systems
Neha Sharma, Usha Batra
EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS
(2020)
Article
Statistics & Probability
Deepika Kumar, Usha Batra
JOURNAL OF STATISTICS AND MANAGEMENT SYSTEMS
(2020)