Results 251 to 260 of about 14,780 (307)
Sterilization of image steganography using self-supervised convolutional neural network. [PDF]
Liu J, Xu F, Zhao Y, Xin X, Liu K, Ma Y.
europepmc +1 more source
POSERS: A Steganography-Driven Molecular Tagging System Using Randomized DNA Sequences for Secure Authentication. [PDF]
Tafazoli Yazdi A, Nejjar P, Hochrein L.
europepmc +1 more source
Secure cloud computing: leveraging GNN and leader K-means for intrusion detection optimization. [PDF]
Dugyala R +7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Video Based Steganography (Motion Vector Steganography)
Jurnal Teknik Indonesia, 2023Steganography is a technique for hiding information in digital media so that it cannot be detected by third parties. One effective steganography method is Motion Vector Steganography (MVS), which utilizes motion vectors in video compression to insert secret messages.
null Della Patresya Sitohang +3 more
openaire +1 more source
ACM SIGITE Newsletter, 2016
The MP4 files have become the most used video media file available, and will mostly likely remain at the top for some time to come. This makes MP4 files an interesting candidate for steganography. With its size and structure, it offers a challenge to steganography developers.
Anthony Ramirez, Alfredo Fernandez
openaire +1 more source
The MP4 files have become the most used video media file available, and will mostly likely remain at the top for some time to come. This makes MP4 files an interesting candidate for steganography. With its size and structure, it offers a challenge to steganography developers.
Anthony Ramirez, Alfredo Fernandez
openaire +1 more source
Compression‐based steganography
Concurrency and Computation: Practice and Experience, 2019SummaryConventional privacy‐enforcement mechanisms, such as encryption‐based ones, are frequently used to prevent third‐party eavesdroppers to intercept confidential information exchanged between two or more parties. However, the use of such mechanisms can be perceivable and it alerts the involved intercepting entities that could devote some effort in ...
Carpentieri B. +4 more
openaire +2 more sources

