Results 351 to 360 of about 53,608 (389)
Some of the next articles are maybe not open access.

A Systematic Review of Computational Image Steganography Approaches

Archives of Computational Methods in Engineering, 2022
Sharanpreet Kaur   +3 more
exaly   +2 more sources

A New Payload Partition Strategy in Color Image Steganography

IEEE transactions on circuits and systems for video technology (Print), 2020
In traditional steganographic schemes, RGB three channels payloads are assigned equally in a true color image. In fact, the security of color image steganography relates not only to data-embedding algorithms but also to different payload partition.
Xin Liao   +4 more
semanticscholar   +1 more source

Generative Steganography Based on Long Readable Text Generation

IEEE Transactions on Computational Social Systems
Text steganography has received a lot of attention in the application of covert communication. How to ensure desirable capacity and imperceptibility has become a key issue in text steganography.
Yi Cao   +6 more
semanticscholar   +1 more source

Steganography

2007
Steganography, the process of hiding information, can be used to embed information or messages in digital files. Some uses are legitimate, such as digital watermarking or the combination of text with medical images. But the technique can also be used for criminal purposes or by terrorists to disguise communications between individuals.
Merrill Warkentin   +2 more
openaire   +1 more source

Steganography and Steganalysis

2006
In the digital environment, steganography has increasingly received attention over the last decade. Steganography, which literally means “covered writing,” includes any process that conceals data or information within other data or conceals the fact that a message is being sent.
Merrill Warkentin   +2 more
openaire   +1 more source

Image Steganography With Symmetric Embedding Using Gaussian Markov Random Field Model

IEEE transactions on circuits and systems for video technology (Print), 2021
Recent advances on adaptive steganography show that the performance of image steganographic communication can be improved by incorporating the non-additive models that capture the dependencies among adjacent pixels.
Wenkang Su   +3 more
semanticscholar   +1 more source

Collage Steganography

5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06), 2006
Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Methods of steganography have been mostly applied on images while the major characteristic of these methods is ...
Sajad Shirali-Shahreza   +1 more
openaire   +2 more sources

Steganography in Textiles

2008 The Fourth International Conference on Information Assurance and Security, 2008
Covert exchange of information has been long a significant and highlighted affair. Numerous methods have been devised for the matter of which steganography is a popular one. Already applied in the past, the method has been massive used following the invention of computer.
Sajad Shirali-Shahreza   +1 more
openaire   +2 more sources

RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks

IEEE Transactions on Information Forensics and Security, 2019
Linguistic steganography based on text carrier auto-generation technology is a current topic with great promise and challenges. Limited by the text automatic generation technology or the corresponding text coding methods, the quality of the ...
Zhongliang Yang   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy