Asec 2023 2023
DOI: 10.3390/asec2023-16635
|View full text |Cite
|
Sign up to set email alerts
|

Personal Social Network Profile Authentication through Image Steganography

Subhadip Mukherjee,
Somnath Mukhopadhyay,
Sunita Sarkar

Abstract: This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/).

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 14 publications
0
1
0
Order By: Relevance
“…We may consider the use of the MSSN profiles as property for the purposes of network behavioral forecasting, comparison, and classification based on formalizations or experiential machine learning. We can mention how this network profiling differentiates from the usual profiling of digital communication and social networking, which deal with personal social network profiles [73] and technologically considers a set of parameters that define network conditions.…”
Section: Y5(t)mentioning
confidence: 99%
“…We may consider the use of the MSSN profiles as property for the purposes of network behavioral forecasting, comparison, and classification based on formalizations or experiential machine learning. We can mention how this network profiling differentiates from the usual profiling of digital communication and social networking, which deal with personal social network profiles [73] and technologically considers a set of parameters that define network conditions.…”
Section: Y5(t)mentioning
confidence: 99%