2017
DOI: 10.1007/s11042-017-4420-8
|View full text |Cite
|
Sign up to set email alerts
|

Image steganography for authenticity of visual contents in social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
30
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 61 publications
(30 citation statements)
references
References 32 publications
0
30
0
Order By: Relevance
“…In recent years, a convolution neural network (CNN) has had excellent performance in image and video recognition, [22][23][24] recommender system, 25,26 and nature language processing. 27,28 Compared to the traditional machine learning methods, which learn the hand-crafted features, [29][30][31] CNN is independent from prior knowledge and human effort in feature design.…”
Section: Methodsmentioning
confidence: 99%
“…In recent years, a convolution neural network (CNN) has had excellent performance in image and video recognition, [22][23][24] recommender system, 25,26 and nature language processing. 27,28 Compared to the traditional machine learning methods, which learn the hand-crafted features, [29][30][31] CNN is independent from prior knowledge and human effort in feature design.…”
Section: Methodsmentioning
confidence: 99%
“…The disadvantage of this method is that it requires multiple cloud service providers to resist collusion attack. For authenticity of visual substance utilizing TLE (Three-Level Encryption), MS (Morton Scanning) coordinated substitution of LSB (Least Significant Bit), color model transformation, and picture Steganography, a safe cryptographic system was introduced by Khan Muhammad et al [23]. The disadvantage is to make the stego image resilience against image processing attacks; the Steganography technique must be implement using transform domain.…”
Section: Related Work: a Brief Reviewmentioning
confidence: 99%
“…Nowadays, the internet is the most used medium to access desired information. However, the internet misused activities or cybercrimes such as security breaches [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19] are also increasing exponentially. In order to overcome these attacks, cryptography and steganography algorithms are used.…”
Section: Introductionmentioning
confidence: 99%
“…The table is show that the lightweight cipher consume minimum area for s-boxes as compared to other the conventional ciphers but increase the computation time for encryption due to the large number of rounds In steganography, choosing multimedia file for data embedding has played an important role. The multimedia files include text, protocol, audio, image, and the video [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. Various characteristics of these multimedia files have been used for data hiding as shown in Table 2.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation