Results 361 to 370 of about 53,608 (389)
Some of the next articles are maybe not open access.

Steganography

2008
Publisher Summary This chapter focuses on a specific data-hiding application—steganography. As opposed to digital watermarking, the main property of steganography is statistical undetectability of embedded data. The payload is usually unrelated to the cover Work, which only serves as a decoy.
Ingemar J. Cox   +4 more
openaire   +2 more sources

Distributed Steganography

2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
In this paper, we address the issue of "distributed steganography" known as many cooperative computations with distributed parties in the covert communication. We present a model of distributed steganography, and give some properties. For the reader's convenience, we consider a scenario in which two senders have their own private data, and wish to ...
Xin Liao, Sha Shi, Qiao-yan Wen
openaire   +2 more sources

Trends in steganography

Communications of the ACM, 2014
Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged.
Elzbieta Zielinska   +2 more
openaire   +2 more sources

Compression‐based steganography

Concurrency and Computation: Practice and Experience, 2019
SummaryConventional privacy‐enforcement mechanisms, such as encryption‐based ones, are frequently used to prevent third‐party eavesdroppers to intercept confidential information exchanged between two or more parties. However, the use of such mechanisms can be perceivable and it alerts the involved intercepting entities that could devote some effort in ...
Carpentieri B.   +4 more
openaire   +3 more sources

Digital image steganography: challenges, investigation, and recommendation for the future direction

Soft Computing - A Fusion of Foundations, Methodologies and Applications, 2023
A. A. Abdulla
semanticscholar   +1 more source

Steganography in MMS

2007 IEEE International Multitopic Conference, 2007
After rapid growth of the Internet, establishing hidden communication is an important subject of security that has gained increasing importance. One of the methods for establishing hidden communication is steganography. On the other hand with the expanding the use of mobile phones mobile telecommunication companies starting to add additional features ...
openaire   +2 more sources

On the limits of steganography

IEEE Journal on Selected Areas in Communications, 1998
In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and traffic security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches-many of them developed to hide encrypted copyright marks or serial numbers in ...
Fabien A. P. Petitcolas, Ross Anderson
openaire   +1 more source

Digital image steganography: A literature survey

Information Sciences, 2022
Pratap Chandra Mandal   +3 more
semanticscholar   +1 more source

Steganography with Hash

2009 2nd International Congress on Image and Signal Processing, 2009
This paper presents a novel LSB steganographic scheme which attempts to defeat statistical steganalysis. The embedding distortion introduced to the cover image is small for perceptual and statistical detection. The modification of image pixel values for embedding is just like conventional image processing which is capable of resisting all kinds of LSB ...
Aiming Wang, Xiao Yi Yu
openaire   +2 more sources

Steganography: A Survey

2018
Due to the popularity of Internet and communication media, data security is one of the most focused areas of research. Cryptography and steganography are two important disciplines in the area of security. Image steganography is one of the techniques used to hide data inside an innocent image so that it is not visible to an eavesdropper while ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy