Results 21 to 30 of about 14,780 (307)
Steganography - INTRODUCTION TO STEGANOGRAPHY
Steganography - INTRODUCTION TO ...
openaire +2 more sources
Deep Image Steganography Using Transformer and Recursive Permutation
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security.
Zhiyi Wang +3 more
doaj +1 more source
Statistical feature-based steganalysis for pixel-value differencing steganography
Pixel-value differencing (PVD) steganography is a popular spatial domain technology. Several PVD-based studies have proposed extended PVD steganography methods.
Wen-Bin Lin, Tai-Hung Lai, Ko-Chin Chang
doaj +1 more source
Binary image steganography method based on layered embedding
A non-additive distortion binary image steganography method was proposed which divided the cover image into two sub cover images, updated the distortion through delivering influence factor, and used the minimizing distortion codes to achieve message ...
Yuxiang CHENG +3 more
doaj +3 more sources
A Dynamic Multi-Layer Steganography Approach Based on Arabic Letters’ Diacritics and Image Layers
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored.
Saad Said Alqahtany +3 more
doaj +1 more source
Steganography Security: Principle and Practice
This paper focuses on several theoretical issues and principles in steganography security, and defines four security levels by analyzing the corresponding algorithm instances.
Yan Ke +4 more
doaj +1 more source
At the organization of a covert communication channel a number of requirements are imposed on used steganography algorithms among which one of the main are: resistance to attacks against the built-in message, reliability of perception of formed ...
O.V. Kostyrka
doaj +1 more source
Detecting fingerprints of audio steganography software
Steganography has experienced rapidly growth with spreading access to the Internet in recent decades. Such low cost, simple process and easy promotion steganographic softwares pose serious and growing threats and challenges to network security.
Chen Gong +5 more
doaj +1 more source
Adaptive Image Steganography Against JPEG Compression [PDF]
Existing network communication systems often employ JPEG compression to reduce communication overhead when transmitting images.However,traditional image steganography techniques lack the ability to withstand JPEG compression.After performing lossy ...
ZHANG Jinghan, CHEN Wen
doaj +1 more source
CHALLENGES IN MULTI-LAYER DATA SECURITY FOR VIDEO STEGANOGRAPHY
The steganography is prone to number of attacks such as geomatical, salt & pepper, gaussian, median filtering, attacks. To overcome these problems, the cryptography and error correction codes are comes in the pictures and hybrid with steganography ...
Samar Kamil +3 more
doaj +1 more source

