Results 131 to 140 of about 23,715 (170)
Some of the next articles are maybe not open access.
International Journal of Digital Crime and Forensics, 2019
This article describes how to overcome the shortage of steganalysis for small capacity-based embedding. A slight modification method is proposed to break steganography. For a given image, traditional steganalysis methods are first used to achieve a preliminary result.
Zhenxing Qian +3 more
openaire +1 more source
This article describes how to overcome the shortage of steganalysis for small capacity-based embedding. A slight modification method is proposed to break steganography. For a given image, traditional steganalysis methods are first used to achieve a preliminary result.
Zhenxing Qian +3 more
openaire +1 more source
Proceedings of the 8th workshop on Multimedia and security, 2006
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectability and capacity of a prototypical implementation of both approaches are described and discussed.
Christian Krätzer +3 more
openaire +1 more source
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectability and capacity of a prototypical implementation of both approaches are described and discussed.
Christian Krätzer +3 more
openaire +1 more source
Vectorial Compound Metapixels for Arbitrary Nonorthogonal Polarization Steganography
Advanced Materials, 2021Zi-Lan Deng, Tan Shi, shumin xiao
exaly
Digital image steganography: A literature survey
Information Sciences, 2022Pratap Mandal +2 more
exaly

