Results 231 to 240 of about 14,292 (271)
Some of the next articles are maybe not open access.

Steganography for medical record image

Computers in Biology and Medicine, 2023
Medical record images in EHR system are users' privacy and an asset, and there is an urgent need to protect this data. Image steganography can offer a potential solution. A steganographic model for medical record images is therefore developed based on StegaStamp.
Chunjun Hua   +6 more
openaire   +2 more sources

Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography

IEEE Transactions on Information Forensics and Security, 2020
In digital image steganography, the statistical model of an image is essential for hiding data in less detectable regions and achieving better security. This has been addressed in the literature where different cost-based and statistical model-based approaches were proposed.
Mehdi Sharifzadeh   +2 more
openaire   +1 more source

Steganography and classification of image steganography techniques

2014 International Conference on Computing for Sustainable Global Development (INDIACom), 2014
Information is wealth of any organization and in present era in which information transferred through digital media and internet, it became a top priority for any organizations to protect this wealth. Whatever technique we adopt for the security purpose, the degree and level of security always remains top concern. Steganography is one such technique in
Sumeet Kaur, Savina Bansal, R. K. Bansal
openaire   +1 more source

Image Steganography Using GANs

2021
Secure transmission of information across networks is of esteem importance to meet confidentiality and privacy goals and therefore is a huge concern to modern society. To prevent information from being compromised during communication, many steganography or data hiding algorithms have been introduced in recent years.
Ketan Ramaneti   +3 more
openaire   +1 more source

Image Steganography Using Random Image

2019
Now-a-days every person depends on computer and Internet. Security is one of the major problem in public communication systems, the information may be accessed by third parties during the transmission of data through a network. Network security is not sufficient, and cybercrime is also increasing.
S. Kiran   +2 more
openaire   +1 more source

Image steganography and steganalysis

WIREs Computational Statistics, 2011
AbstractImage steganography is used to embed covert messages in the form of files, text, or other images in digital images. The intent is to transmit hidden information. Steganalysis is the process used to detect hidden messages in images. Although steganography is not a new discipline, it has become increasingly important in today's digital world ...
Mayra Bachrach, Frank Y. Shih
openaire   +1 more source

Towards Robust Image Steganography

IEEE Transactions on Circuits and Systems for Video Technology, 2019
Posting images on social network platforms is happening everywhere and every single second. Thus, the communication channels offered by various social networks have a great potential for covert communication. However, images transmitted through such channels will usually be JPEG compressed, which fails most of the existing steganographic schemes.
Jinyuan Tao   +3 more
openaire   +1 more source

Location-Based Image Steganography

The Smart Computing Review, 2014
The objective of steganography is to conceal the presence of a secret communication. Nevertheless, with the development of steganalytic attack, also known as steganalysis, there are many statistical methods to estimate the presence and ratio of secret messages.
openaire   +1 more source

Digital Image Steganography

2021 International Conference on Simulation, Automation & Smart Manufacturing (SASM), 2021
Aditya Saxena, Ganga Maheshwari
openaire   +1 more source

Steganography in Halftone Images

2017
While gray-scale images can be readily displayed in computer monitors and other light-emitting displays, they also need to be displayed routinely in other reflective media such as newspaper, magazines, books, and other printed documents. However, in reflective media, the application of ink on the reflective media implies that only 1-bit images (with ...
Au, Oscar C L   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy