4.6 Article

Genetic algorithm and hamilton path based data hiding scheme including embedding cost optimization

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Geochemistry & Geophysics

Local Similarity-Based Spatial-Spectral Fusion Hyperspectral Image Classification With Deep CNN and Gabor Filtering

Uzair Aslam Bhatti et al.

Summary: This article introduces a novel HSI classification algorithm, LSPGF, which utilizes LSP and Gabor filtering to extract deeper features from original hyperspectral data, achieving higher classification accuracy compared to other algorithms.

IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING (2022)

Article Chemistry, Analytical

An Optimized Framework for Energy-Resource Allocation in a Cloud Environment based on the Whale Optimization Algorithm

Shanky Goyal et al.

Summary: Cloud computing is an innovative technology that provides online data access, manipulation, and configuration services. Research has shown the importance of reducing energy consumption in cloud infrastructure and the need for algorithms and techniques for effective server resource scheduling. Load balancing is crucial for efficient operation of cloud environments.

SENSORS (2021)

Article Computer Science, Information Systems

Packet Optimization of Software Defined Network Using Lion Optimization

Jagmeet Kaur et al.

Summary: The increasing demand for cloud services has raised concerns about latency, energy-efficiency, and security. Technologies like software-defined networks are being used to support future network functions efficiently. This research proposes an optimization strategy for offline cloud scenarios, aiming to improve throughput and reduce latency rates.

CMC-COMPUTERS MATERIALS & CONTINUA (2021)

Article Computer Science, Information Systems

Hybrid Watermarking Algorithm Using Clifford Algebra With Arnold Scrambling and Chaotic Encryption

Uzair Aslam Bhatti et al.

IEEE ACCESS (2020)

Article Computer Science, Artificial Intelligence

Hamiltonian path based image steganography scheme with improved imperceptibility and undetectability

Gyan Singh Yadav et al.

APPLIED SOFT COMPUTING (2018)

Article Computer Science, Hardware & Architecture

Improving stego image quality in image interpolation based data hiding

Chin-Nung Yang et al.

COMPUTER STANDARDS & INTERFACES (2017)

Article Computer Science, Artificial Intelligence

A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm

Hamidreza Rashidy Kanan et al.

EXPERT SYSTEMS WITH APPLICATIONS (2014)

Article Computer Science, Artificial Intelligence

Color local complexity estimation based steganographic (CLCES) method

Blanca E. Carvajal-Gamez et al.

EXPERT SYSTEMS WITH APPLICATIONS (2013)

Article Computer Science, Artificial Intelligence

Increasing image compression rate using steganography

Reza Jafari et al.

EXPERT SYSTEMS WITH APPLICATIONS (2013)

Article Computer Science, Artificial Intelligence

A novel technique for image steganography based on a high payload method and edge detection

Anastasia Ioannidou et al.

EXPERT SYSTEMS WITH APPLICATIONS (2012)

Article Computer Science, Information Systems

Reversible steganography based on side match and hit pattern for VQ-compressed images

Cheng-Hsing Yang et al.

INFORMATION SCIENCES (2011)

Article Computer Science, Software Engineering

Secret image sharing with authentication-chaining and dynamic embedding

Z. Eslami et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2011)

Article Engineering, Electrical & Electronic

Classification of steganalysis techniques: A study

Arooj Nissar et al.

DIGITAL SIGNAL PROCESSING (2010)

Article Computer Science, Artificial Intelligence

BSS: Boosted steganography scheme with cover image preprocessing

Hedieh Sajedi et al.

EXPERT SYSTEMS WITH APPLICATIONS (2010)

Article Computer Science, Artificial Intelligence

High payload steganography mechanism using hybrid edge detector

Wen-Jan Chen et al.

EXPERT SYSTEMS WITH APPLICATIONS (2010)

Article Computer Science, Theory & Methods

Adaptive data hiding in edge areas of images with spatial LSB domain systems

Cheng-Hsing Yang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2008)

Article Computer Science, Artificial Intelligence

Sharing secrets in stego images with authentication

Chin-Chen Chang et al.

PATTERN RECOGNITION (2008)

Article Computer Science, Information Systems

Reversible hiding in DCT-based compressed images

Chin-Chen Chang et al.

INFORMATION SCIENCES (2007)

Article Computer Science, Artificial Intelligence

High-performance JPEG steganography using quantization index modulation in DCT domain

H Noda et al.

PATTERN RECOGNITION LETTERS (2006)

Article Computer Science, Artificial Intelligence

Hiding data in images by simple LSB substitution

CK Chan et al.

PATTERN RECOGNITION (2004)

Article Computer Science, Software Engineering

Secret image sharing with steganography and authentication

CC Lin et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2004)

Article Computer Science, Artificial Intelligence

A steganographic method for images by pixel-value differencing

DC Wu et al.

PATTERN RECOGNITION LETTERS (2003)