2023
DOI: 10.52866/ijcsm.2023.01.01.007
|View full text |Cite
|
Sign up to set email alerts
|

Image Steganography Based on Chaos Function and Randomize Function

Abstract: The exchange of data is not limited to personal text information or information about institutions and governments, but includes digital media transferred via the Internet including everything, whether texts, images or videos and audio, or animation. These media need high-security protection and high speed during its transmission from one site to another. In this study, a new method is suggested for hiding a gray-level image within a larger color image based on the proposed steganography map that merged chaoti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 11 publications
0
1
0
Order By: Relevance
“…They are consistently enhancing these tactics and broadening their capacity to recognize and understand electronic threats. Cyberattacks are deliberate and harmful actions aimed at computer systems, networks, and devices via the Internet to compromise or harm sensitive information [13][14][15][16][17][18][19][20]. Unauthorized individuals are attracted to computer systems due to the valuable information they hold.…”
Section: Introductionmentioning
confidence: 99%
“…They are consistently enhancing these tactics and broadening their capacity to recognize and understand electronic threats. Cyberattacks are deliberate and harmful actions aimed at computer systems, networks, and devices via the Internet to compromise or harm sensitive information [13][14][15][16][17][18][19][20]. Unauthorized individuals are attracted to computer systems due to the valuable information they hold.…”
Section: Introductionmentioning
confidence: 99%
“…They are continually seeking to develop these strategies and make them more effective and able to know the behaviour of electronic attacks. Cyberattacks can be described as malicious activities that target computer systems, networks, and devices over the Internet, intending to endanger or damage sensitive information [13][14][15][16][17][18][19][20]. Computer systems are among the most desirable systems to be controlled by unauthorized persons because the information included within these systems is very necessary to them [21].…”
Section: Introductionmentioning
confidence: 99%
“…To anticipate future stock prices, deep learning algorithms for forecasting stock prices examine previous price changes, market trends, and other financial data [8][9]. models are capable of addressing the inherent risk and unpredictability of a stock market because they can handle largescale datasets, capture complicated nonlinear relationships, and adaptively acquire information from the data [10][11][12].…”
Section: Introductionmentioning
confidence: 99%