2021
DOI: 10.1016/j.patrec.2021.04.026
|View full text |Cite
|
Sign up to set email alerts
|

Steganogram removal using multidirectional diffusion in fourier domain while preserving perceptual image quality

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(6 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Different steganographic methods provide different degrees of robustness of stego objects and resistance to image sterilization processes. Some sterilization techniques are presented in [22][23][24]. As the MDD method belongs to the category of LSB steganography (in spatial domain), it is not resistant to different types of attacks or the sterilization of the stego object.…”
Section: Average Values (mentioning
confidence: 99%
“…Different steganographic methods provide different degrees of robustness of stego objects and resistance to image sterilization processes. Some sterilization techniques are presented in [22][23][24]. As the MDD method belongs to the category of LSB steganography (in spatial domain), it is not resistant to different types of attacks or the sterilization of the stego object.…”
Section: Average Values (mentioning
confidence: 99%
“…This study looks at how the internet of things (IoT) can be used to improve waste collection systems. It contrasts a standard periodic review technique with an IoT-enabled strategy in which we assume garbage bins are equipped with smart sensors that provide continuous monitoring of the bin's status [4] [11]. A simulation model is developed that is based on two modules: the waste generation and the waste management.…”
Section: Literature Surveymentioning
confidence: 99%
“…It was recommended by Rarhi et al [24] that the picture encryption be carried out with the help of the Blowfish Algorithm because it possesses superior execution and delivery time. The images were hidden using the Least Significant Bit (LSB) approach [12], which was applied by the method. A hybrid strategy, which uses a mixture of picture encryption, image encryption + image concealing, is still recommended for providing a substantial level of protection.…”
Section: Review Of Literaturementioning
confidence: 99%
“…Using the results of D ij , color bands (RGB) with pixel values and infrared light are preserved in a distinct manner. In the end, it can be summed up as follows in Equation (12).…”
Section: Mod( )mentioning
confidence: 99%