Results 161 to 170 of about 3,467 (203)
Multifunctional Au-Ag-Cr Nanocomposites: From Multiplex Sensing and Advanced Logic Computing to Scalable Information Protection. [PDF]
Zhou J +5 more
europepmc +1 more source
Enhanced brain image security using a hybrid of lifting wavelet transform and support vector machine. [PDF]
Mohamed AF +3 more
europepmc +1 more source
Multi-carrier information hiding based on projection-driven vertex embedding in 3D models. [PDF]
Ou Y +5 more
europepmc +1 more source
A novel and efficient digital image steganography technique using least significant bit substitution. [PDF]
Rahman S +8 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
The rise of social networks during the last 10 years has created a situation in which up to 100 million new images and photographs are uploaded and shared by users every day. This environment poses an ideal background for those who wish to communicate covertly by the use of steganography.
Martin Steinebach +2 more
openaire +1 more source
The rise of social networks during the last 10 years has created a situation in which up to 100 million new images and photographs are uploaded and shared by users every day. This environment poses an ideal background for those who wish to communicate covertly by the use of steganography.
Martin Steinebach +2 more
openaire +1 more source
Steganalysis of Perturbed Quantization
2006 IEEE 14th Signal Processing and Communications Applications, 2006Recently proposed Perturbed Quantization (PQ) data hiding is a novel steganographic scheme which is undetectable with the current steganalysis methods. In this paper PQ steganography scheme is described briefly and a novel singular value decomposition (SVD) based steganalysis method is proposed to detect PQ embedding.
Avcibas, Ismail +2 more
openaire +2 more sources
2011
In this chapter we provide a detailed overview of the state of the art in steganalysis. Performance of some steganalysis techniques are compared based on critical parameters such as the hidden message detection probability, accuracy of the estimated hidden message length and secret key, and so forth.
Hafiz Malik +2 more
openaire +1 more source
In this chapter we provide a detailed overview of the state of the art in steganalysis. Performance of some steganalysis techniques are compared based on critical parameters such as the hidden message detection probability, accuracy of the estimated hidden message length and secret key, and so forth.
Hafiz Malik +2 more
openaire +1 more source

