相关期刊:《High-Confidence Computing》《Journal of Computer and Communications》《Computer Systems Science & Engineering》《Computer Modeling in Engineering & Sciences》更多>>
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data.This property makes it difficult for steganalysts’powerful data extrac...
This research was funded by the Ministry of Higher Education(MOHE)through Fundamental Research Grant Scheme(FRGS)under the Grand Number FRGS/1/2020/ICT01/UK M/02/4,and University Kebangsaan Malaysia for open access publication.
Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into ...
Watermarking is the advanced technology utilized to secure digital data by integrating ownership or copyright protection.Most of the traditional extracting processes in audio watermarking have some restrictions due to...
supported by the National Natural Science Foundation of China (62072325);Shanxi Scholarship Council of China (HGKY2019081);Fundamental Research Program of Shanxi Province (202103021224272);TYUST SRIF (20212039).
Data hiding(DH)is an important technology for securely transmitting secret data in networks,and has increasing become a research hotspot throughout the world.However,for Joint photographic experts group(JPEG)images,it...
National Natural Science Foundation of China,No.61972458;Natural Science Foundation of Zhejiang Province,No.LZ23F020002.
Deep neural networks are vulnerable to attacks from adversarial inputs.Corresponding attack research on human pose estimation(HPE),particularly for body joint detection,has been largely unexplored.Transferring classif...
supported by the National Natural Science Foundation of China(Grant No.61762060);Educational Commission of Gansu Province,China(Grant No.2017C-05);Foundation for the Key Research and Development Program of Gansu Province,China(Grant No.20YF3GA016);supported by King Saud University,Riyadh,Saudi Arabia,through Researchers Supporting Project No.RSP-2022/184;The work of author Ayman Radwan was supported by FCT/MEC through Programa Operacional Regional do Centro and by the European Union through the European Social Fund(ESF)under Investigator FCT Grant(5G-AHEAD IF/FCT-IF/01393/2015/CP1310/CT0002).
The authenticity and integrity of healthcare is the primary objective.Numerous reversible watermarking schemes have been developed to improve the primary objective but increasing the quantity of embedding data leads t...
This work is conducted at Razak Faculty of Technology and Informatics,under cyber physical systems research group and funded by MOHE(FRGS:R.K130000.7856.5F026),Received by Nilam Nur Amir Sjarif.
The most sensitive Arabic text available online is the digital Holy Quran.This sacred Islamic religious book is recited by all Muslims worldwide including non-Arabs as part of their worship needs.Thus,it should be pro...
The principle of digital watermark is the method of adding digital watermark in the frequency domain. The digital watermark hides the watermark in digital media, such as image, voice, video, etc., so as to realize the...
Digital representation of multimedia is more advantageous than the analog one due to potentially improving the portability, efficiency, and accuracy of the information presented. Despite the challenge of having high h...