Results 351 to 360 of about 53,608 (389)
Some of the next articles are maybe not open access.
A Systematic Review of Computational Image Steganography Approaches
Archives of Computational Methods in Engineering, 2022Sharanpreet Kaur+3 more
exaly +2 more sources
A New Payload Partition Strategy in Color Image Steganography
IEEE transactions on circuits and systems for video technology (Print), 2020In traditional steganographic schemes, RGB three channels payloads are assigned equally in a true color image. In fact, the security of color image steganography relates not only to data-embedding algorithms but also to different payload partition.
Xin Liao+4 more
semanticscholar +1 more source
Generative Steganography Based on Long Readable Text Generation
IEEE Transactions on Computational Social SystemsText steganography has received a lot of attention in the application of covert communication. How to ensure desirable capacity and imperceptibility has become a key issue in text steganography.
Yi Cao+6 more
semanticscholar +1 more source
Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research
Neurocomputing, 2019Inas Jawad Kadhim+2 more
exaly +2 more sources
2007
Steganography, the process of hiding information, can be used to embed information or messages in digital files. Some uses are legitimate, such as digital watermarking or the combination of text with medical images. But the technique can also be used for criminal purposes or by terrorists to disguise communications between individuals.
Merrill Warkentin+2 more
openaire +1 more source
Steganography, the process of hiding information, can be used to embed information or messages in digital files. Some uses are legitimate, such as digital watermarking or the combination of text with medical images. But the technique can also be used for criminal purposes or by terrorists to disguise communications between individuals.
Merrill Warkentin+2 more
openaire +1 more source
Steganography and Steganalysis
2006In the digital environment, steganography has increasingly received attention over the last decade. Steganography, which literally means “covered writing,” includes any process that conceals data or information within other data or conceals the fact that a message is being sent.
Merrill Warkentin+2 more
openaire +1 more source
Image Steganography With Symmetric Embedding Using Gaussian Markov Random Field Model
IEEE transactions on circuits and systems for video technology (Print), 2021Recent advances on adaptive steganography show that the performance of image steganographic communication can be improved by incorporating the non-additive models that capture the dependencies among adjacent pixels.
Wenkang Su+3 more
semanticscholar +1 more source
5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06), 2006
Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Methods of steganography have been mostly applied on images while the major characteristic of these methods is ...
Sajad Shirali-Shahreza+1 more
openaire +2 more sources
Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Methods of steganography have been mostly applied on images while the major characteristic of these methods is ...
Sajad Shirali-Shahreza+1 more
openaire +2 more sources
2008 The Fourth International Conference on Information Assurance and Security, 2008
Covert exchange of information has been long a significant and highlighted affair. Numerous methods have been devised for the matter of which steganography is a popular one. Already applied in the past, the method has been massive used following the invention of computer.
Sajad Shirali-Shahreza+1 more
openaire +2 more sources
Covert exchange of information has been long a significant and highlighted affair. Numerous methods have been devised for the matter of which steganography is a popular one. Already applied in the past, the method has been massive used following the invention of computer.
Sajad Shirali-Shahreza+1 more
openaire +2 more sources
RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks
IEEE Transactions on Information Forensics and Security, 2019Linguistic steganography based on text carrier auto-generation technology is a current topic with great promise and challenges. Limited by the text automatic generation technology or the corresponding text coding methods, the quality of the ...
Zhongliang Yang+4 more
semanticscholar +1 more source