Results 41 to 50 of about 6,204,929 (359)

Video and Image Steganography

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology, 2023
Video steganography, a technique for embedding secret information within video sequences, has gained prominence in the domain of covert communication. By exploiting the inherent redundancy and high capacity of video data, this approach enables secure data transmission without raising suspicion.
null Prof. B. N. Babar   +4 more
openaire   +1 more source

Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure

open access: yesEngineering Science and Technology, an International Journal, 2021
In all forms of confidential communication, the most significant element is security. Cryptography can be used to secure the information, but it discloses the presence of covert communication. Hence, steganography was invented; steganography is an art of
Pratik D. Shah, Rajankumar S. Bichkar
doaj   +1 more source

High capacity steganographic method based upon JPEG [PDF]

open access: yes, 2008
The two most important aspects of any image-based steganographic system are the quality of the stegoimage and the capacity of the cover image. This paper proposes a novel and high capacity steganographic approach based on Discrete Cosine Transformation (
Al-Mohammad, A, Ghinea, G, Hierons, RM
core   +1 more source

Design and Implementation of Automated Steganography Image-Detection System for the KakaoTalk Instant Messenger

open access: yesComputers, 2020
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj   +1 more source

Combining and Steganography of 3D Face Textures [PDF]

open access: yes, 2017
One of the serious issues in communication between people is hiding information from others, and the best way for this, is deceiving them. Since nowadays face images are mostly used in three dimensional format, in this paper we are going to steganography
Becker, Bernd   +6 more
core   +3 more sources

Payload location for JPEG image steganography based on co-frequency sub-image filtering

open access: yesInternational Journal of Distributed Sensor Networks, 2020
In digital steganography, due to difficulties estimating the JPEG cover image, it is still very hard to accurately locate the hidden message embedded in a JPEG image.
Jie Wang   +4 more
doaj   +1 more source

Image hiding by using spatial domain steganography

open access: yesWasit Journal of Computer and Mathematics Science, 2023
This article provides an overview of steganography and its use for hiding images in other images. Steganography is a technique that allows users to hide information in plain sight, making it difficult for unauthorized parties to detect or access the ...
Ghazali Bin Sulong, Maria A.Wimmer
doaj   +1 more source

Coverless Image Steganography: Review

open access: yesAcademic Journal of Nawroz University, 2022
Many of the existing image steganographic techniques embed secret information into cover images by slightly altering their contents. These modifications have several effects, on the other hand, Stego-images distorted by these problems become vulnerable to steganalysis tools. Coverless information hiding represents a solution to this problem.
Shler Farhad Khorshid   +1 more
openaire   +1 more source

Perbandingan Kapasitas Pesan pada Steganografi DCT Sekuensial dan Steganografi DCT F5 dengan Penerapan Point Operation Image Enhancement

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2016
Steganographic  process on the DCT transform is generally done on the value of DCT quantization process results that have a value other than 0, this relates to the distribution of the diversity of pixels in the image.
Dian Hafidh Zulfikar, Agus Harjoko
doaj   +1 more source

Applications of Deep Learning in Image Steganography [PDF]

open access: yesAnnals of Dunarea de Jos University. Fascicle I : Economics and Applied Informatics
The current paper presents the concept of steganography, with a focus on image steganography. It outlines a few relevant techniques for image steganography. Provides implementation details and a comparative evaluation of design and results.
Adrian Doroiman
doaj   +1 more source

Home - About - Disclaimer - Privacy