咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
    • 1 篇 软件工程

主题

  • 3 篇 audio steganogra...
  • 2 篇 information secu...
  • 1 篇 sample diversifi...
  • 1 篇 secret image
  • 1 篇 cover enhancemen...
  • 1 篇 pixel value diff...
  • 1 篇 reverse steganog...
  • 1 篇 visual cryptogra...
  • 1 篇 adversarial pert...
  • 1 篇 data hiding

机构

  • 1 篇 institute of res...
  • 1 篇 jis college of e...
  • 1 篇 school of comput...
  • 1 篇 school of cyber ...
  • 1 篇 department of el...
  • 1 篇 global institute...
  • 1 篇 faculty of infor...
  • 1 篇 department of me...

作者

  • 1 篇 peisong he
  • 1 篇 ayman aaly
  • 1 篇 arun kumar sivar...
  • 1 篇 jiayong liu
  • 1 篇 jie luo
  • 1 篇 alaknanda s.pati...
  • 1 篇 g.sundari
  • 1 篇 sreeparna gangul...
  • 1 篇 qiang xia
  • 1 篇 dac-nhuong le
  • 1 篇 jiangchuan li
  • 1 篇 pranati rakshit
  • 1 篇 souvik pal

语言

  • 3 篇 英文
检索条件"主题词=audio steganography"
3 条 记 录,以下是1-10 订阅
Cover Enhancement Method for audio steganography Based on Universal Adversarial Perturbations with Sample Diversification
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 4893-4915页
作者: Jiangchuan Li Peisong He Jiayong Liu Jie Luo Qiang Xia School of Cyber Science and Engineering Sichuan UniversityChengdu610065China
steganography techniques,such as audio steganography,have been widely used in covert ***,the deep neural network,especially the convolutional neural network(CNN),has greatly threatened the security of audio ***,existi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Securing Technique Using Pattern-Based LSB audio steganography and Intensity-Based Visual Cryptography
收藏 引用
Computers, Materials & Continua 2021年 第4期67卷 1207-1224页
作者: Pranati Rakshit Sreeparna Ganguly Souvik Pal Ayman AAly Dac-Nhuong Le JIS College of Engineering KalyaniWest Bengal741235India Global Institute of Management and Technology NadiaWest Bengal741102India Department of Mechanical Engineering College of EngineeringTaif UniversityTaif21944Saudi Arabia Institute of Research and Development Duy Tan UniversityDanang550000Vietnam Faculty of Information Technology Duy Tan UniversityDanang550000Vietnam
With the increasing need of sensitive or secret data transmission through public network,security demands using cryptography and steganography are becoming a thirsty research area of last few *** two techniques can be... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Comparative Analysis of Execution of CNN-Based Sanguine Data Transmission with LSB-SS and PVD-SS
收藏 引用
Computer Systems Science & Engineering 2023年 第8期46卷 1707-1721页
作者: Alaknanda S.Patil G.Sundari Arun Kumar Sivaraman Department of Electronics and Communication Sathyabama Institute of Science and TechnologyChennaiTamil Nadu600119India School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India
The intact data transmission to the authentic user is becoming crucial at every moment in the current ***;is a technique for concealing the hidden message in any cover media such as image,video;and audio to increase t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论