Results 31 to 40 of about 14,292 (271)

Code wars: steganography, signals intelligence, and terrorism [PDF]

open access: yes, 2003
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been ...
Alex P. Schmid   +11 more
core   +2 more sources

A study on the false positive rate of Stegdetect [PDF]

open access: yes, 2013
In this paper we analyse Stegdetect, one of the well-known image steganalysis tools, to study its false positive rate. In doing so, we process more than 40,000 images randomly downloaded from the Internet using Google images, together with 25,000 images ...
Benjamin Aziz   +13 more
core   +1 more source

Steganograhy in Images by Using Intersecting Planes [PDF]

open access: yesEngineering and Technology Journal, 2011
Steganography is the art of hiding, and transmitting information using apparently innocent carrier without expose any suspicion. In this paper the proposed system is an implementation of image steganography techniques.
Esraa Jaffar Baker
doaj   +1 more source

Image Steganography in Wavelet Domain [PDF]

open access: yesPort Said Engineering Research Journal, 2017
Steganography is the science of hiding secret data within any kind of medium such as image, video, audio and document. The two main category of image steganography are spatial-based embedding and transform-based embedding.
Aisha Elkafrawy   +2 more
doaj   +1 more source

Image Steganography: A Review of the Recent Advances

open access: yesIEEE Access, 2021
Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes.
Nandhini Subramanian   +3 more
doaj   +1 more source

Steganography in beautified mages

open access: yesMathematical Biosciences and Engineering, 2019
Existing distortion functions in steganography which achieved high undetectability are designed for unprocessed natural image. Nowadays, a large number of images are filtered before transmitting for the sake of beautification. In this situation, existing distortion functions should be improved to fit the properties of these beautified images.
Liyun Liu   +4 more
openaire   +3 more sources

Video and Image Steganography

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology, 2023
Video steganography, a technique for embedding secret information within video sequences, has gained prominence in the domain of covert communication. By exploiting the inherent redundancy and high capacity of video data, this approach enables secure data transmission without raising suspicion.
null Prof. B. N. Babar   +4 more
openaire   +1 more source

Combining and Steganography of 3D Face Textures [PDF]

open access: yes, 2017
One of the serious issues in communication between people is hiding information from others, and the best way for this, is deceiving them. Since nowadays face images are mostly used in three dimensional format, in this paper we are going to steganography
Becker, Bernd   +6 more
core   +3 more sources

Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure

open access: yesEngineering Science and Technology, an International Journal, 2021
In all forms of confidential communication, the most significant element is security. Cryptography can be used to secure the information, but it discloses the presence of covert communication. Hence, steganography was invented; steganography is an art of
Pratik D. Shah, Rajankumar S. Bichkar
doaj   +1 more source

High capacity steganographic method based upon JPEG [PDF]

open access: yes, 2008
The two most important aspects of any image-based steganographic system are the quality of the stegoimage and the capacity of the cover image. This paper proposes a novel and high capacity steganographic approach based on Discrete Cosine Transformation (
Al-Mohammad, A, Ghinea, G, Hierons, RM
core   +1 more source

Home - About - Disclaimer - Privacy