Results 41 to 50 of about 14,292 (271)

Payload location for JPEG image steganography based on co-frequency sub-image filtering

open access: yesInternational Journal of Distributed Sensor Networks, 2020
In digital steganography, due to difficulties estimating the JPEG cover image, it is still very hard to accurately locate the hidden message embedded in a JPEG image.
Jie Wang   +4 more
doaj   +1 more source

Design and Implementation of Automated Steganography Image-Detection System for the KakaoTalk Instant Messenger

open access: yesComputers, 2020
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj   +1 more source

Image hiding by using spatial domain steganography

open access: yesWasit Journal of Computer and Mathematics Science, 2023
This article provides an overview of steganography and its use for hiding images in other images. Steganography is a technique that allows users to hide information in plain sight, making it difficult for unauthorized parties to detect or access the ...
Ghazali Bin Sulong, Maria A.Wimmer
doaj   +1 more source

Coverless Image Steganography: Review

open access: yesAcademic Journal of Nawroz University, 2022
Many of the existing image steganographic techniques embed secret information into cover images by slightly altering their contents. These modifications have several effects, on the other hand, Stego-images distorted by these problems become vulnerable to steganalysis tools. Coverless information hiding represents a solution to this problem.
Shler Farhad Khorshid   +1 more
openaire   +1 more source

Perbandingan Kapasitas Pesan pada Steganografi DCT Sekuensial dan Steganografi DCT F5 dengan Penerapan Point Operation Image Enhancement

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2016
Steganographic  process on the DCT transform is generally done on the value of DCT quantization process results that have a value other than 0, this relates to the distribution of the diversity of pixels in the image.
Dian Hafidh Zulfikar, Agus Harjoko
doaj   +1 more source

An Evolutionary Computing Enriched RS Attack Resilient Medical Image Steganography Model for Telemedicine Applications

open access: yes, 2018
The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices
Abdelrahim, Elsaid MD.   +1 more
core   +1 more source

Applications of Deep Learning in Image Steganography [PDF]

open access: yesAnnals of Dunarea de Jos University. Fascicle I : Economics and Applied Informatics
The current paper presents the concept of steganography, with a focus on image steganography. It outlines a few relevant techniques for image steganography. Provides implementation details and a comparative evaluation of design and results.
Adrian Doroiman
doaj   +1 more source

Chaotic color multi-image compression-encryption/ LSB data type steganography scheme for NFT transaction security

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
With the rapid development of blockchain technology, the security of non-fungible tokens (NFT) in the transaction process has attracted much attention.
Zheyi Zhang   +3 more
doaj   +1 more source

Work design improvement at Miroad Rubber Industries Sdn. Bhd. [PDF]

open access: yes, 2020
Erul Food Industries known as Salaiport Industry is a family-owned company and was established on July 2017. Salaiport Industry apparently moved to a new place at Pedas, Negeri Sembilan.
Chen, Xue Chee   +7 more
core  

AN ENHANCED APPROACH UTILIZING AN OPTIMIZED DISCRETE WAVELET TRANSFORM FOR IMAGE STEGANOGRAPHY IN MEDICAL IMAGING

open access: yesMağallaẗ Al-kūfaẗ Al-handasiyyaẗ
Image steganography constitutes a specific form of steganography wherein an image is employed as the concealing medium. Medical Image Steganography represents a distinctive subfield within the broader domain of Image Steganography.
Hayder A. Hadi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy