2019
DOI: 10.1080/1206212x.2019.1692442
|View full text |Cite
|
Sign up to set email alerts
|

Encryption-based steganography of images by multiobjective whale optimal pixel selection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(13 citation statements)
references
References 17 publications
0
13
0
Order By: Relevance
“…According to a combination of those 2 values, 2 message bits may be hidden on every one of the pixels. Ambika et al [17] proposed an encryption-based steganographic method. The cover image was separated to RGB components in a separate manner.…”
Section: Literature Surveymentioning
confidence: 99%
“…According to a combination of those 2 values, 2 message bits may be hidden on every one of the pixels. Ambika et al [17] proposed an encryption-based steganographic method. The cover image was separated to RGB components in a separate manner.…”
Section: Literature Surveymentioning
confidence: 99%
“…The input image is classified into R, G and B modules individually to examine the modules of the initial colors of all parts of the image [14]. In RGB, the cover image is separated on the basis of LL, LH, HL and HH bands for determining the pixels' position.…”
Section: Image Decompositionmentioning
confidence: 99%
“…When compared with diverse vector coefficients, a best pixel has been elected under the application of IWOA. Generally, WOA is stimulated by the hunting performance of humpback whales that applies the shrinking encircling method, spiral for simulating bubble net assaulting method and surrounds the prey [14].Here, 3 functions accelerate the performances of humpback whales are encircling victim, exploring the victim (exploration stage) and bubble-net foraging (exploitation stage), correspondingly.…”
Section: Optimal Pixel Selection Using Iwoamentioning
confidence: 99%
See 1 more Smart Citation
“…[5] Thus, the face segmentation and recognition have drawn considerable attention by researchers. However, can be applied in smart applications like human computer interaction, querying the database, [6] virtual reality, information security, [7] operating system, health monitoring reports, [8] real-time online bank transactions, biometrics, etc. [9] The efficiency of face recognition methods are highly influenced by few factors such as complex background, distortion in the expression, head lying position, the distance between the camera and the subject, lighting conditions, etc.…”
Section: Introductionmentioning
confidence: 99%