Open Access
ARTICLE
Yi Cao1, Kuo Zhang1, Chengsheng Yuan2,*, Linglong Zhu1, Wentao Ge2
1 School of Cyber Science and Engineering, Wuxi University, Wuxi, 214105, China
2 School of Computer Science, School of Cyber Science and Engineering, Nanjing University of Information Science and Technology, Nanjing, 210044, China
* Corresponding Author: Chengsheng Yuan. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.070158
Received 09 July 2025; Accepted 19 September 2025; Published online 22 October 2025
View
Download
Like
Novel Ransomware Hiding Model Using HEVC Steganography Approach
Iman Almomani, Aala AlKhayer,...Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model
Khalid A. El Drandaly, Walid Khedr,...An Improved Optimized Model for Invisible Backdoor Attack Creation Using Steganography
Daniyal M. Alghazzawi, Osama Bassam...Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment
Mahmoud Ragab, Samah Alshehri,...DWT-SVD Based Image Steganography Using Threshold Value Encryption Method
Jyoti Khandelwal, Vijay Kumar...