Results 231 to 240 of about 14,204 (271)
Some of the next articles are maybe not open access.

Steganography and classification of image steganography techniques

2014 International Conference on Computing for Sustainable Global Development (INDIACom), 2014
Information is wealth of any organization and in present era in which information transferred through digital media and internet, it became a top priority for any organizations to protect this wealth. Whatever technique we adopt for the security purpose, the degree and level of security always remains top concern. Steganography is one such technique in
Sumeet Kaur, Savina Bansal, R. K. Bansal
openaire   +1 more source

Image Steganography Using GANs

2021
Secure transmission of information across networks is of esteem importance to meet confidentiality and privacy goals and therefore is a huge concern to modern society. To prevent information from being compromised during communication, many steganography or data hiding algorithms have been introduced in recent years.
Ketan Ramaneti   +3 more
openaire   +1 more source

Image Steganography Using Random Image

2019
Now-a-days every person depends on computer and Internet. Security is one of the major problem in public communication systems, the information may be accessed by third parties during the transmission of data through a network. Network security is not sufficient, and cybercrime is also increasing.
S. Kiran   +2 more
openaire   +1 more source

Image steganography and steganalysis

WIREs Computational Statistics, 2011
AbstractImage steganography is used to embed covert messages in the form of files, text, or other images in digital images. The intent is to transmit hidden information. Steganalysis is the process used to detect hidden messages in images. Although steganography is not a new discipline, it has become increasingly important in today's digital world ...
Mayra Bachrach, Frank Y. Shih
openaire   +1 more source

Towards Robust Image Steganography

IEEE Transactions on Circuits and Systems for Video Technology, 2019
Posting images on social network platforms is happening everywhere and every single second. Thus, the communication channels offered by various social networks have a great potential for covert communication. However, images transmitted through such channels will usually be JPEG compressed, which fails most of the existing steganographic schemes.
Jinyuan Tao   +3 more
openaire   +1 more source

Location-Based Image Steganography

The Smart Computing Review, 2014
The objective of steganography is to conceal the presence of a secret communication. Nevertheless, with the development of steganalytic attack, also known as steganalysis, there are many statistical methods to estimate the presence and ratio of secret messages.
openaire   +1 more source

Digital Image Steganography

2021 International Conference on Simulation, Automation & Smart Manufacturing (SASM), 2021
Aditya Saxena, Ganga Maheshwari
openaire   +1 more source

Steganography in Halftone Images

2017
While gray-scale images can be readily displayed in computer monitors and other light-emitting displays, they also need to be displayed routinely in other reflective media such as newspaper, magazines, books, and other printed documents. However, in reflective media, the application of ink on the reflective media implies that only 1-bit images (with ...
Au, Oscar C L   +2 more
openaire   +2 more sources

Inverted LSB Image Steganography

2020
This paper focus on a change in the plain Least Significant Bit based image/picture steganography and implementation of it. The paper asserts the utilization of bit reversal method to enhance the quality of stego-picture. The bit reversal methods that are proposed and implemented based on 2 schemes.
Indu Maurya, S. K. Gupta
openaire   +1 more source

IIS: Implicit Image Steganography

2014
In steganography secrets are imposed inside the cover medium either by replacing bits in the spatial domain or changing the frequency domain. Instead the proposed Implicit Image Steganography (IIS) scheme does not alter or replace bits in the original cover image for hiding information.
K. Jithesh, P. Babu Anto
openaire   +1 more source

Home - About - Disclaimer - Privacy