Results 21 to 30 of about 47,392 (384)

Quantum Image Steganography Schemes for Data Hiding: A Survey

open access: yesApplied Sciences, 2022
Quantum steganography plays a critical role in embedding confidential data into carrier messages using quantum computing schemes. The quantum variant of steganography outperforms its classical counterpart from security, embedding efficiency and capacity,
Nasro Min-Allah   +7 more
doaj   +1 more source

JPEG steganography with particle swarm optimization accelerated by AVX [PDF]

open access: yes, 2020
Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography.
Bramas B   +7 more
core   +1 more source

Image hiding by using spatial domain steganography

open access: yesWasit Journal of Computer and Mathematics Science, 2023
This article provides an overview of steganography and its use for hiding images in other images. Steganography is a technique that allows users to hide information in plain sight, making it difficult for unauthorized parties to detect or access the ...
Ghazali Bin Sulong, Maria A.Wimmer
doaj   +1 more source

A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography

open access: yesItalian National Conference on Sensors, 2022
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly.
Rose Adee, H. Mouratidis
semanticscholar   +1 more source

Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions [PDF]

open access: yes, 1999
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext, the resulting stegotext is required to have exactly the same probability ...
Boudreau, Eric   +4 more
core   +6 more sources

Steganography and Steganalysis in Voice over IP: A Review

open access: yesSensors, 2021
The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the
Zhijun Wu   +3 more
doaj   +1 more source

Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector

open access: yesIEEE Transactions on Information Forensics and Security, 2022
Since the introduction of adaptive steganography, most of the recent research works seek at designing cost functions that are evaluated against steganalysis methods.
R. Cogranne, Quentin Giboulot, P. Bas
semanticscholar   +1 more source

Provably Secure Generative Linguistic Steganography [PDF]

open access: yesFindings, 2021
Generative linguistic steganography mainly utilized language models and applied steganographic sampling (stegosampling) to generate high-security steganographic text (stegotext). However, previous methods generally lead to statistical differences between
Siyu Zhang   +3 more
semanticscholar   +1 more source

Survey on image non-additive steganography

open access: yes网络与信息安全学报, 2021
Image non-additive steganography not only can better maintain the distribution of image elements, but also has high detection resistance.Firstly, the image non-additive image steganography methods were sorted out and divided into two major categories ...
Yaofei WANG   +4 more
doaj   +3 more sources

A novel steganography approach for audio files [PDF]

open access: yes, 2020
We present a novel robust and secure steganography technique to hide images into audio files aiming at increasing the carrier medium capacity. The audio files are in the standard WAV format, which is based on the LSB algorithm while images are ...
Abdulrazzaq, Sazeen T   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy