2022
DOI: 10.18517/ijaseit.12.6.16002
|View full text |Cite
|
Sign up to set email alerts
|

Data Hiding Scheme Based on Quad General Difference Expansion Cluster

Abstract: For some periods, information technology has developed, but there are some issues with its data security. For this reason, exploring the data hiding method is relevant, which is an appropriate study in the information concealment paradigm. Several factors must be considered in its implementation, such as the capacity of the confidential data and the quality of the generated stego file. Nevertheless, it is difficult to solve those two problems simultaneously in actual application. We often need to choose either… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…A cluster is defined by the position of the center in the n-dimensional space of the Attributes of the ExampleSet [21][22][23][24][25]. Some researchers use process clustering in their research to obtain valid results [26][27][28][29][30]. The similarity between Examples is based on a distance measure between them.…”
Section: Clustering Processmentioning
confidence: 99%
“…A cluster is defined by the position of the center in the n-dimensional space of the Attributes of the ExampleSet [21][22][23][24][25]. Some researchers use process clustering in their research to obtain valid results [26][27][28][29][30]. The similarity between Examples is based on a distance measure between them.…”
Section: Clustering Processmentioning
confidence: 99%
“…The fuzzy logic type 1 (FT1), which is selected in this work based on state-of-the-art works such as [21], consists of a set B from the universe U ranging from 0 to 1, which belongs to a function that is continuous mathematically expressed as πœ‡ 𝐡 : π‘ˆ β†’ [0, 1]. Let 𝐡, the fuzzy membership function noted as πœ‡ 𝐡 (𝑒), we mathematically express the function 𝐡 as of (1).…”
Section: Related Work a Fuzzy-based Edge Detection Algorithmsmentioning
confidence: 99%
“…These filters remain unaltered during the training phase, rendering the layer nontrainable. The arrangement of the convolutional layers during this phase is as such: maintaining "same" padding and utilizing strides of (1,1). This setup utilizes 30 filters, the details of which are expounded upon later, and employs a πŸ‘ Γ— 𝑻𝒂𝒏𝑯 activation function mathematically expressed in (30).…”
Section: ) Preprocessing Partmentioning
confidence: 99%
See 1 more Smart Citation
“…Image steganography is a technique used in secret communication to hide confidential data within ordinary cover media such as images [1], video [2], audio [3], and text [4]. In digital images, the modified pixel values in stego images are subtly altered, making them difficult to discern from the original images [5][6][7][8]. With image steganalysis, the objective is to identify the traces of embedding or even attempt to recover the concealed information in a reverse steganography process [9], as illustrated in Fig.…”
Section: Introductionmentioning
confidence: 99%