Results 21 to 30 of about 15,292 (300)

Binary image steganography method based on layered embedding

open access: yes网络与信息安全学报, 2021
A non-additive distortion binary image steganography method was proposed which divided the cover image into two sub cover images, updated the distortion through delivering influence factor, and used the minimizing distortion codes to achieve message ...
Yuxiang CHENG   +3 more
doaj   +3 more sources

JPEG steganography with particle swarm optimization accelerated by AVX [PDF]

open access: yes, 2020
Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography.
Bramas B   +7 more
core   +1 more source

A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network

open access: yesIEEE Access, 2020
Image steganography is a technology that hides sensitive information into an image. The traditional image steganography method tends to securely embed secret information in the host image so that the payload capacity is almost ignored and the ...
Xintao Duan   +5 more
doaj   +1 more source

A novel steganography approach for audio files [PDF]

open access: yes, 2020
We present a novel robust and secure steganography technique to hide images into audio files aiming at increasing the carrier medium capacity. The audio files are in the standard WAV format, which is based on the LSB algorithm while images are ...
Abdulrazzaq, Sazeen T   +2 more
core   +1 more source

Film and Television Animation Sensing and Visual Image by Computer Digital Image Technology

open access: yesJournal of Mathematics, 2022
In order to study the application of computer digital image processing technology in film and television (FAT) animation visual sensing expression, by studying the principle of digital image processing technology and visual sensing technology, a spatial ...
Lu Lian, Tong Lei
doaj   +1 more source

Image Steganography

open access: yesInternational Journal of Recent Technology and Engineering (IJRTE), 2020
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The advantage of steganography is that the intended secret message does not attract attention to itself as an object of scrutiny. Steganography is concerned both with concealing the fact that a secret message is being sent and its
Yendluri Lohith JayaSurya   +2 more
openaire   +2 more sources

Adaptive image steganography based on optimal embedding and robust against chi-square attack [PDF]

open access: yes, 2011
A real-life requirement motivated this case study of secure covert communication. Steganography is a technique used to transfer hidden information in an imperceptible manner.
Ibrahim, Subariah, Zanganeh, Omid
core   +1 more source

Adaptive Image Steganography Against JPEG Compression [PDF]

open access: yesJisuanji kexue
Existing network communication systems often employ JPEG compression to reduce communication overhead when transmitting images.However,traditional image steganography techniques lack the ability to withstand JPEG compression.After performing lossy ...
ZHANG Jinghan, CHEN Wen
doaj   +1 more source

Steganography in beautified mages

open access: yesMathematical Biosciences and Engineering, 2019
Existing distortion functions in steganography which achieved high undetectability are designed for unprocessed natural image. Nowadays, a large number of images are filtered before transmitting for the sake of beautification. In this situation, existing distortion functions should be improved to fit the properties of these beautified images.
Liyun Liu   +4 more
openaire   +3 more sources

Image Steganography Using LSB and Hybrid Encryption Algorithms

open access: yesApplied Sciences, 2023
In today’s era of widespread web technology and cloud computing, ensuring data security has become a crucial concern across various industries. Instances of data breaches and vulnerabilities in cloud storage have emphasized the need for robust data ...
May Alanzy   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy