Results 21 to 30 of about 6,204,929 (359)
JPEG steganography with particle swarm optimization accelerated by AVX [PDF]
Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography.
Bramas B +7 more
core +1 more source
A novel steganography approach for audio files [PDF]
We present a novel robust and secure steganography technique to hide images into audio files aiming at increasing the carrier medium capacity. The audio files are in the standard WAV format, which is based on the LSB algorithm while images are ...
Abdulrazzaq, Sazeen T +2 more
core +1 more source
Image steganography is a technology that hides sensitive information into an image. The traditional image steganography method tends to securely embed secret information in the host image so that the payload capacity is almost ignored and the ...
Xintao Duan +5 more
doaj +1 more source
Film and Television Animation Sensing and Visual Image by Computer Digital Image Technology
In order to study the application of computer digital image processing technology in film and television (FAT) animation visual sensing expression, by studying the principle of digital image processing technology and visual sensing technology, a spatial ...
Lu Lian, Tong Lei
doaj +1 more source
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The advantage of steganography is that the intended secret message does not attract attention to itself as an object of scrutiny. Steganography is concerned both with concealing the fact that a secret message is being sent and its
Yendluri Lohith Jayasurya +2 more
openaire +1 more source
Image Steganography Using LSB and Hybrid Encryption Algorithms
In today’s era of widespread web technology and cloud computing, ensuring data security has become a crucial concern across various industries. Instances of data breaches and vulnerabilities in cloud storage have emphasized the need for robust data ...
May Alanzy +3 more
semanticscholar +1 more source
High performance image steganography integrating IWT and Hamming code within secret sharing
Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct ...
Zahra Saeidi +4 more
semanticscholar +1 more source
Pixel steganography method for grayscale image steganography on colour images
The process of hiding secret data within a host signal is known as steganography; its design parameters are imperceptibility, concealment capacity, and recovered data quality. A case of images, one of the existing methods based on modification of the host image pixels is called Block Pixel Hiding Method (BPHM), which has good imperceptibility and high ...
Hadi Hussein Madhi +3 more
openaire +1 more source
Adaptive Image Steganography Against JPEG Compression [PDF]
Existing network communication systems often employ JPEG compression to reduce communication overhead when transmitting images.However,traditional image steganography techniques lack the ability to withstand JPEG compression.After performing lossy ...
ZHANG Jinghan, CHEN Wen
doaj +1 more source
Image steganography with visual illusion
Human eyes are often “cheated” by an optical illusion (or visual illusion) so that the perceived image differs from the physical reality. But various optical illusions have been seldom investigated for technological applications such as image processing and optical display in the past.
Shuming Jiao, Jun Feng
openaire +2 more sources

