Results 371 to 380 of about 53,608 (389)
Some of the next articles are maybe not open access.
PSNR vs SSIM: imperceptibility quality assessment for image steganography
Multimedia tools and applications, 2020D. Setiadi
semanticscholar +1 more source
Proceedings of the 42nd annual Southeast regional conference, 2004
Steganography is the ability to hide information within an object that appears to be above suspicion to the naked eye. This paper gives a brief introduction to the world of steganography. It then focuses on the JPEG format and its use of application markers to learn how to hide information. JPEG images are used to hide data using two simple algorithms.
openaire +2 more sources
Steganography is the ability to hide information within an object that appears to be above suspicion to the naked eye. This paper gives a brief introduction to the world of steganography. It then focuses on the JPEG format and its use of application markers to learn how to hide information. JPEG images are used to hide data using two simple algorithms.
openaire +2 more sources
Steganography and new implementation of steganography
Proceedings of the IEEE 13th Signal Processing and Communications Applications Conference, 2005., 2006U. Nuriyev, S. Akleylek
openaire +2 more sources
2011
Abstract Steganography is the art of covered, or hidden, writing. The purpose of steganography is covert communication—to hide the existence of a message from a third party. Knowledge of steganography is of increasing importance to individuals in the law enforcement, intelligence, and military communities.
Chet Hosmer, Gary C. Kessler
openaire +2 more sources
Abstract Steganography is the art of covered, or hidden, writing. The purpose of steganography is covert communication—to hide the existence of a message from a third party. Knowledge of steganography is of increasing importance to individuals in the law enforcement, intelligence, and military communities.
Chet Hosmer, Gary C. Kessler
openaire +2 more sources
An improved steganography without embedding based on attention GAN
Peer-to-Peer Networking and Applications, 2021Cong Yu+5 more
semanticscholar +1 more source
Image steganography using least significant bit and secret map techniques
International Journal of Electrical and Computer Engineering, 2020exaly