Results 231 to 240 of about 14,292 (271)
Some of the next articles are maybe not open access.
Steganography for medical record image
Computers in Biology and Medicine, 2023Medical record images in EHR system are users' privacy and an asset, and there is an urgent need to protect this data. Image steganography can offer a potential solution. A steganographic model for medical record images is therefore developed based on StegaStamp.
Chunjun Hua +6 more
openaire +2 more sources
Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography
IEEE Transactions on Information Forensics and Security, 2020In digital image steganography, the statistical model of an image is essential for hiding data in less detectable regions and achieving better security. This has been addressed in the literature where different cost-based and statistical model-based approaches were proposed.
Mehdi Sharifzadeh +2 more
openaire +1 more source
Steganography and classification of image steganography techniques
2014 International Conference on Computing for Sustainable Global Development (INDIACom), 2014Information is wealth of any organization and in present era in which information transferred through digital media and internet, it became a top priority for any organizations to protect this wealth. Whatever technique we adopt for the security purpose, the degree and level of security always remains top concern. Steganography is one such technique in
Sumeet Kaur, Savina Bansal, R. K. Bansal
openaire +1 more source
Image Steganography Using GANs
2021Secure transmission of information across networks is of esteem importance to meet confidentiality and privacy goals and therefore is a huge concern to modern society. To prevent information from being compromised during communication, many steganography or data hiding algorithms have been introduced in recent years.
Ketan Ramaneti +3 more
openaire +1 more source
Image Steganography Using Random Image
2019Now-a-days every person depends on computer and Internet. Security is one of the major problem in public communication systems, the information may be accessed by third parties during the transmission of data through a network. Network security is not sufficient, and cybercrime is also increasing.
S. Kiran +2 more
openaire +1 more source
Image steganography and steganalysis
WIREs Computational Statistics, 2011AbstractImage steganography is used to embed covert messages in the form of files, text, or other images in digital images. The intent is to transmit hidden information. Steganalysis is the process used to detect hidden messages in images. Although steganography is not a new discipline, it has become increasingly important in today's digital world ...
Mayra Bachrach, Frank Y. Shih
openaire +1 more source
Towards Robust Image Steganography
IEEE Transactions on Circuits and Systems for Video Technology, 2019Posting images on social network platforms is happening everywhere and every single second. Thus, the communication channels offered by various social networks have a great potential for covert communication. However, images transmitted through such channels will usually be JPEG compressed, which fails most of the existing steganographic schemes.
Jinyuan Tao +3 more
openaire +1 more source
Location-Based Image Steganography
The Smart Computing Review, 2014The objective of steganography is to conceal the presence of a secret communication. Nevertheless, with the development of steganalytic attack, also known as steganalysis, there are many statistical methods to estimate the presence and ratio of secret messages.
openaire +1 more source
2021 International Conference on Simulation, Automation & Smart Manufacturing (SASM), 2021
Aditya Saxena, Ganga Maheshwari
openaire +1 more source
Aditya Saxena, Ganga Maheshwari
openaire +1 more source
Steganography in Halftone Images
2017While gray-scale images can be readily displayed in computer monitors and other light-emitting displays, they also need to be displayed routinely in other reflective media such as newspaper, magazines, books, and other printed documents. However, in reflective media, the application of ink on the reflective media implies that only 1-bit images (with ...
Au, Oscar C L +2 more
openaire +2 more sources

