Results 271 to 280 of about 15,292 (300)
Some of the next articles are maybe not open access.
Implementation of Image Steganography and Combination of Cryptography and Steganography
2023Information transmission over the net is a very common process and securing the information plays an important role. Cryptography and Steganography are the two important techniques that provides secure transmission of data over the internet medium. Cryptography converts the data into an unreadable format, steganography is used to hide the encrypted ...
openaire +1 more source
Digital image steganography: challenges, investigation, and recommendation for the future direction
Soft Computing - A Fusion of Foundations, Methodologies and Applications, 2023A. Abdulla
semanticscholar +1 more source
PSNR vs SSIM: imperceptibility quality assessment for image steganography
Multimedia tools and applications, 2020D. Setiadi
semanticscholar +1 more source
IMAGE STEGANOGRAPHY AND STEGANALYSIS: CONCEPTS AND PRACTICE
2004In the last few years, we have seen many new and powerful steganography and steganalysis techniques reported in the literature. In the following paper we go over some general concepts and ideas that apply to steganography and steganalysis. Specifically we establish a framework and define notion of security for a steganographic system.
Rajarathnam Chandramouli +2 more
openaire +1 more source
Steganography in Halftone Images
2017While gray-scale images can be readily displayed in computer monitors and other light-emitting displays, they also need to be displayed routinely in other reflective media such as newspaper, magazines, books, and other printed documents. However, in reflective media, the application of ink on the reflective media implies that only 1-bit images (with ...
Au, Oscar C L +2 more
openaire +2 more sources
A Systematic Review of Computational Image Steganography Approaches
Archives of Computational Methods in Engineering, 2022Sharanpreet Kaur +3 more
semanticscholar +1 more source
A Novel Image Steganography Method for Industrial Internet of Things Security
IEEE Transactions on Industrial Informatics, 2021M. Hassaballah +3 more
semanticscholar +1 more source
Image based steganography and cryptography.
2007In this paper we describe a method for integrating together cryptography and steganography through image processing. In particular, we present a system able to perform steganography and cryptography at the same time using images as cover objects for steganography and as keys for cryptography. We will show such system is an effective steganographic one (
BLOISI, Domenico Daniele, IOCCHI, Luca
openaire +1 more source
Digital image steganography: A literature survey
Information Sciences, 2022P. Mandal +3 more
semanticscholar +1 more source

