| International Journal of Nonlinear Analysis and Applications | ||
| Volume 12, Special Issue, January 0, Pages 1885-1904 PDF (2.36 M) | ||
| DOI: 10.22075/ijnaa.2021.5939 | ||
| Receive Date: 03 August 2021, Revise Date: 13 September 2021, Accept Date: 20 November 2021 | ||
| References | ||
|
[1] B. Abd-El-Atty, A.M. Iliyasu, H. Alaskar, A. El-Latif and A. Ahmed, A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms, Sensors 20(11) (2020) 3108. [2] A. Abdulbaqi, M. Younis, Y. Younus and A. Obaid, A hybrid technique for EEG signals evaluation and classification as a step towards to neurological and cerebral disorders diagnosis, Int. J. Nonlinear Anal. Appl. 13(1) (2022) 773–781. [3] M.N. Abdulwahedand, S.T. Mustafa and M.S.M. Rahim, Image spatial domain steganography: A study of performance evaluation parameters, IEEE 9th Int. Conf. Syst. Engine. Technol. (2019) 309–314. [4] A. Alabaichi, M.A.A.K. Al-Dabbas, A. Salih, Image steganography using least significant bit and secret map techniques, Int. J. Elect. Comput. Engin. 10(1) (2020) 935–946. [5] T. AlKhodaidi A. Gutub, Refining image steganography distribution for higher security multimedia counting-based secret-sharing, Multimedia Tools and Appl. (2020) 1–31. [6] S. Chatterjee, M. Biswas, D. Maji, B.K. Ghosh and R.K. Mandal, Logarithm similarity measure based automatic esophageal cancer detection using discrete wavelet transform, Recent Trends and Advances in Artificial Intelligence and Internet of Things (2020) 427–453. [7] Q.S. Hamad, M.Q. Mohammed and S.Q. Muhamed, Surface water pollution monitoring system based on IOT, Plant Arch. 20(2) (2020) 630–634. [8] M.M. Hashim, A.K. Mohsin and M.S.M. Rahim, All-encompassing review of biometric information protection in fingerprints based steganography, Proc. 3rd Int. Symp. Computer Sci. Intell. Control (2019) 1–8.[9] M.M. Hashim and M. Rahim, Image steganography based on odd/even pixels distribution scheme and two parameters random function, J. Theore. Appl.Inf. Technol. 95(22) (2017). [10] M.M. Hashim, S.H. Rhaif, A.A. Abdulrazzaq, A.H. Ali, M.S. Taha, Based on IoT healthcare application for medical data authentication: Towards a new secure framework using steganography, IOP Conf.Ser.: Materials Sci. Engin. 881(1) (2020) 012120. [11] M. Hassaballah, M.A. Hameed and M.H. Alkinani, Introduction to digital image steganography, Digital Media Stegan. (2020) 1–15. [12] R.K. Hussein, A. Alenezi, H.F. Atlam, M.Q. Mohammed, R.J. Walters and G.B. Wills, Toward confirming a framework for securing the virtual machine image in cloud computing, Adv. Sci. Technol. Eng. Syst. J. 2(4) (2017) 44–50. [13] M. Hussain and M. Hussain, A survey of image steganography techniques, Int. J. Adv. Sci. Tech. 54 (2013). [14] M. Hussain, A.W.A. Wahab, Y.I.B. Idris, A.T. Ho and K.H. Jung, Image steganography in spatial domain: A survey, Signal Processing: Image Communication, Signal Processing-Image Commun., 65 (2018) 46–66. [15] M. Islam, R. Amarjit and R.H. Laskar, Neural network based robust image watermarking technique in LWT domain, J. Intell. Fuzzy Syst., 34(3) (2018) 1691–1700. [16] D. Jude Hemanth, J. Anitha, D.E. Popescu and L.H. Son, A modified genetic algorithm for performance improvement of transform based image steganography systems, J. Intell. Fuzzy Syst. 35(1) (2018) 197–209. [17] I.J. Kadhim, P. Premaratne, P.J. Vial and B. Halloran, Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research, Neurocomput. 335 (2019) 299–326. [18] B. Karthikeyan, P. Nishmitha, B. Poojasree and S. Asha, Authentication of secret message using Rabin-Karp in image steganography, Int. Conf. Intell. Comput. Control Syst. (2019) 388–391. [19] G. Lakshmi, M. Ghonge and A.J. Obaid, Cloud based IoT smart healthcare system for remote patient monitoring, EAI Endorsed Trans. Pervasive Health Technol. (2021) 1–11. [20] N. Manohar and P.V. Kumar, Data encryption and decryption using steganography, 4th Int. Conf. Intell. Comput. Control Syst. (2020) 697–702. [21] M.Q. Mohammed, S.Q. Muhamed, M. Ievlanov and Z. Gazetdinova, Improvement of the method of scenario analysis of functional requirements to an information system, Eastern-European J. Enterprise Technol. 3(2(99)) (2019) 25–35. [22] B.S. Mohan, A.A. Mahmood, M.Q. Mohammed and N.D. Zaki, Replicating the MAP kinase cascade in membrane computing, J. Phys.: Conf. Ser. 1963(1) (2021) 012156. [23] S.Q. Muhamed, M.Q. Mohammed, M. Evlanov and H. Kliuchko, The ADALINE neuron modification for solving the problem on searching for the reusable functions of the information system, Eastern-European J. Enterprise Technol. 3(2(93)) (2018) 25–32. [24] S.Q. Muhamed, M.Q. Mohammed, T. Nayl, D. Mikhnov and A. Mikhnova, Technology of structural optimization for subsidiary in enterprise information systems, Int. J. Adv. Trends Comput. Sci. Engin. 8(1) (2019) 544–549. [25] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho and S.W. Baik, A novel magic LSB substitution method (MLSB-SM) using multi-level encryption and achromatic component of an image, Multimedia Tool. Appl. 75 (2016) 14867–14893. [26] H. Nyeem, Reversible data hiding with image bit-plane slicing, 20th Int. Conf. Comput. Inf. Technol. (2018) 1–6. [27] J. Qin, Y. Luo, X. Xiang, Y. Tan H. Huang, Coverless image steganography: A survey, IEEE Access 7 (2019) 171372–171394. [28] A.K. Sahu and G. Swain, A novel n-rightmost bit replacement image steganography technique, 3D Res. 10(1) (2019). [29] A.K. Sahu and G. Swain, An optimal information hiding approach based on pixel value differencing and modulus function, Wireless Personal Commun. 108(1) (2019) 159–74. [30] P. Shah, P. Choudhari and S. Sivaraman, Adaptive wavelet packet based audio steganography using data history, IEEE Region 10 and the Third Int. Conf. Indust. Inf. Syst. (2008) 1–5. [31] G.J. Simmons, The prisoners’ problem and the subliminal channel, Adv. Crypt. (1984) 51–67. [32] B. Stoyanov and B. Stoyanov, Boost: Medical image steganography using nuclear spin generator, Entropy 22(5) (2020) 501. [33] W. Su, J. Ni, X. Hu J. Fridrich, Image steganography with symmetric embedding using gaussian Markov random field model, IEEE Trans. Circuit.Syst. Video Technol. 5 (2020). [34] G. Swain, Adaptive and non-adaptive PVD steganography using overlapped pixel blocks, Arab. J. Sci. Engin. 43(12) (2018) 7549–7562. [35] M.S. Taha, M.S.M. Rahim, M.M. Hashim and H.N. Khalid, Information hiding: A tools for securing biometric information, Technol. Rep. Kansai Univ. 62(04) (2020) 1383–1394.[36] https://www.nlm.nih.gov/. | ||
|
Statistics Article View: 44,211 PDF Download: 50,601 |
||