Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation

    Al-Hussien Seddik1, Mohammed Salah2, Gamal Behery2, Ahmed El-harby2, Ahmed Ismail Ebada2, Sokea Teng3, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5087-5103, 2023, DOI:10.32604/cmc.2023.035364

    Abstract The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency. Recently, researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it; this is called the stego image. This paper proposes a new secured coverless steganography system using a generative mathematical model based on semi Quick Response (QR) code and maze game image generation. This system consists of two components. The first component contains two processes, encryption process, and hiding process. The encryption… More >

  • Open Access

    ARTICLE

    Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem

    Ramadhan J. Mstafa1,2,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3349-3368, 2022, DOI:10.32604/cmc.2022.025791

    Abstract The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet's speed and information technology. In spite of this, advancements in technology have resulted in breaches of privacy and data security. When it comes to protecting private information in today's Internet era, digital steganography is vital. Many academics are interested in digital video because it has a great capability for concealing important data. There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data. The visual imperceptibility, robustness, and embedding capacity of these approaches are all… More >

  • Open Access

    ARTICLE

    A Distributed Secret Sharing Method with QR Code Based on Information Hiding

    Pengcheng Jiang, Yu Xue*

    Journal of Cyber Security, Vol.3, No.4, pp. 217-225, 2021, DOI:10.32604/jcs.2021.026022

    Abstract QR codes are applied widely on the Internet and mobile devices in recent years. Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily. Also, the QR code does not have the ability of hiding information, which leads to everyone can get access to read the content in any QR code, including those hiding some secret content in the bytes of QR code. Therefore, in recent years, information tampering and information leakage cases caused by poor security of two-dimensional code occur frequently, especially in the financial field and multi-party verification scenarios.… More >

  • Open Access

    ARTICLE

    A QR Data Hiding Method Based on Redundant Region and BCH

    Ying Zhou*, Weiwei Luo

    Journal on Big Data, Vol.3, No.3, pp. 127-133, 2021, DOI:10.32604/jbd.2021.019236

    Abstract In recent years, QR code has been widely used in the Internet and mobile devices. It is based on open standards and easy to generate a code, which lead to that anyone can generate their own QR code. Because the QR code does not have the ability of information hiding, any device can access the content in QR code. Thus, hiding the secret data in QR code becomes a hot topic. Previously, the information hiding methods based on QR code all use the way of information hiding based on image, mostly using digital watermarking technology, and not using the coding… More >

  • Open Access

    ARTICLE

    A Secure Visual Secret Sharing Scheme with Authentication Based on QR Code

    Xinwei Zhong*, Lizhi Xiong, Zhihua Xia

    Journal on Big Data, Vol.3, No.2, pp. 85-95, 2021, DOI:10.32604/jbd.2021.018618

    Abstract With the rise of the Internet of Things (IoT), various devices in life and industry are closely linked. Because of its high payload, stable error correction capability, and convenience in reading and writing, Quick Response (QR) code has been widely researched in IoT. However, the security of privacy data in IoT is also a very important issue. At the same time, because IoT is developing towards low-power devices in order to be applied to more fields, the technology protecting the security of private needs to have the characteristics of low computational complexity. Visual Secret Sharing (VSS), with its features of… More >

  • Open Access

    ARTICLE

    Book Retrieval Method Based on QR Code and CBIR Technology

    Qiuyan Wang1, *, Haibing Dong2

    Journal on Artificial Intelligence, Vol.1, No.2, pp. 101-110, 2019, DOI:10.32604/jai.2019.08170

    Abstract It is the development trend of library information management, which applies the mature and cutting-edge information technology to library information retrieval. In order to realize the rapid retrieval of massive book information, this paper proposes a book retrieval method combining QR code with image retrieval technology. This method analyzes the visual features of book images, design a book image retrieval method based on boundary contour and regional pixel distribution features, and realizes the association retrieval of book information combined with the QR code, so as to improve the efficiency of book retrieval. The experimental results show that, the books can… More >

Displaying 1-10 on page 1 of 6. Per Page