Results 41 to 50 of about 15,292 (300)

Payload location for JPEG image steganography based on co-frequency sub-image filtering

open access: yesInternational Journal of Distributed Sensor Networks, 2020
In digital steganography, due to difficulties estimating the JPEG cover image, it is still very hard to accurately locate the hidden message embedded in a JPEG image.
Jie Wang   +4 more
doaj   +1 more source

Image hiding by using spatial domain steganography

open access: yesWasit Journal of Computer and Mathematics Science, 2023
This article provides an overview of steganography and its use for hiding images in other images. Steganography is a technique that allows users to hide information in plain sight, making it difficult for unauthorized parties to detect or access the ...
Ghazali Bin Sulong, Maria A.Wimmer
doaj   +1 more source

Perbandingan Kapasitas Pesan pada Steganografi DCT Sekuensial dan Steganografi DCT F5 dengan Penerapan Point Operation Image Enhancement

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2016
Steganographic  process on the DCT transform is generally done on the value of DCT quantization process results that have a value other than 0, this relates to the distribution of the diversity of pixels in the image.
Dian Hafidh Zulfikar, Agus Harjoko
doaj   +1 more source

Chaotic color multi-image compression-encryption/ LSB data type steganography scheme for NFT transaction security

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
With the rapid development of blockchain technology, the security of non-fungible tokens (NFT) in the transaction process has attracted much attention.
Zheyi Zhang   +3 more
doaj   +1 more source

Image steganography with visual illusion

open access: yesOptics Express, 2021
Human eyes are often “cheated” by an optical illusion (or visual illusion) so that the perceived image differs from the physical reality. But various optical illusions have been seldom investigated for technological applications such as image processing and optical display in the past.
Shuming Jiao, Jun Feng
openaire   +2 more sources

Applications of Deep Learning in Image Steganography [PDF]

open access: yesAnnals of Dunarea de Jos University. Fascicle I : Economics and Applied Informatics
The current paper presents the concept of steganography, with a focus on image steganography. It outlines a few relevant techniques for image steganography. Provides implementation details and a comparative evaluation of design and results.
Adrian Doroiman
doaj   +1 more source

An Evolutionary Computing Enriched RS Attack Resilient Medical Image Steganography Model for Telemedicine Applications

open access: yes, 2018
The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices
Abdelrahim, Elsaid MD.   +1 more
core   +1 more source

AN ENHANCED APPROACH UTILIZING AN OPTIMIZED DISCRETE WAVELET TRANSFORM FOR IMAGE STEGANOGRAPHY IN MEDICAL IMAGING

open access: yesMağallaẗ Al-kūfaẗ Al-handasiyyaẗ
Image steganography constitutes a specific form of steganography wherein an image is employed as the concealing medium. Medical Image Steganography represents a distinctive subfield within the broader domain of Image Steganography.
Hayder A. Hadi   +2 more
doaj   +1 more source

Unsupervised Steganalysis Based on Artificial Training Sets

open access: yes, 2016
In this paper, an unsupervised steganalysis method that combines artificial training setsand supervised classification is proposed. We provide a formal framework for unsupervisedclassification of stego and cover images in the typical situation of ...
Lerch-Hostalot, Daniel, Megías, David
core   +1 more source

‘They Need to Hear You Say It’: Healthcare Professionals’ Perspectives on Barriers and Enablers to End‐of‐Life Discussions With Adolescents and Young Adults With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT End‐of‐life conversations with adolescents and young adults (AYAs) with cancer rarely occur without the guidance of healthcare professionals. As a part of the ‘Difficult Discussions’ study, focused on palliative care and advance care planning discussions with AYAs with cancer, we investigated the factors that healthcare professionals identify ...
Justine Lee   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy