Figure 5 - available via license: Creative Commons Attribution 4.0 International
Content may be subject to copyright.
Source publication
In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed face recognition is proposed. In our proposed data hiding approach, a group of morphed face images...
Context in source publication
Similar publications
Information security provides a process of hiding secret information to protect the sensitive data from attackers. To achieve secure data transmission, data hiding and steganographic techniques are being developed. Image steganography is commonly employed in several areas such as telecommunication, mobile computing, online voting system, image retr...