All Stories

  1. Detect and Mitigate Cyberattacks Using SIEM
  2. Image steganography using exploiting modification direction for compressed encrypted data
  3. Video Steganography Using Knight Tour Algorithm and LSB Method for Encrypted Data
  4. Image steganography by using exploiting modification direction and knight tour algorithm
  5. Content-based image retrieval using PSO and k-means clustering algorithm