Author of the publication

Improved Cohort Intelligence - A high capacity, swift and secure approach on JPEG image steganography.

, and . J. Inf. Secur. Appl., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography, and . CoRR, (2010)JPEG based steganography methods using Cohort Intelligence with Cognitive Computing and modified Multi Random Start Local Search optimization algorithms., and . Inf. Sci., (2018)Defeating MageCart Attacks in a NAISS Way., , and . SECRYPT, page 691-697. SCITEPRESS, (2023)Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks., and . CSCML, volume 13914 of Lecture Notes in Computer Science, page 251-272. Springer, (2023)Improved Cohort Intelligence - A high capacity, swift and secure approach on JPEG image steganography., and . J. Inf. Secur. Appl., (2019)Optimization Models in Steganography Using Metaheuristics, , and . Intelligent Systems Reference Library Springer, (2020)The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains., , , and . Comput. Secur., (May 2023)Increase of Capacity and Quality of Frequency Based Image Steganography Using Particle Swarm Optimization., and . ICTCS, page 4:1-4:5. (2016)NAISS: A reverse proxy approach to mitigate MageCart's e-skimmers in e-commerce., , and . Comput. Secur., (2024)Automobile insurance fraud detection using data mining: A systematic literature review., , and . Intell. Syst. Appl., (March 2024)