Results 31 to 40 of about 23,715 (170)

An Evolutionary Computing Enriched RS Attack Resilient Medical Image Steganography Model for Telemedicine Applications

open access: yes, 2018
The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices
Abdelrahim, Elsaid MD.   +1 more
core   +1 more source

Survey of the Use of Steganography over the Internet [PDF]

open access: yesInformatică economică, 2011
This paper addressesthe use of Steganography over the Internet by terrorists. There were ru-mors in the newspapers that Steganography is being used to covert communication between terrorists, without presenting any scientific proof.
Lavinia Mihaela DINCA
doaj  

A Cover Selection HEVC Video Steganography Based on Intra Prediction Mode

open access: yesIEEE Access, 2019
Existing video steganography puts much emphasis on the design of algorithms such as mapping rules or distortion functions, thereby ignoring the selection of cover to embed secret information.
Jie Wang   +3 more
doaj   +1 more source

Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions

open access: yes, 2007
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext, the resulting stegotext is required to have exactly the same probability ...
Moulin, Pierre, Wang, Ying
core   +4 more sources

Computationally secure steganography based on speech synthesis

open access: yes网络与信息安全学报, 2022
The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography ...
Menghan LI   +3 more
doaj   +3 more sources

Arabic Language Text Steganography Based on Singular Value Decomposition (SVD) [PDF]

open access: yesEngineering and Technology Journal, 2016
With the fast development of internet innocent over communication in the network environment has become an important research direction. Steganography means that secret information is embedded into cover data imperceptibly for transmission.
Hanaa M. Ahmed, a A. A. Khohder, Maisa
doaj   +1 more source

Translation-based steganography

open access: yesJournal of Computer Security, 2005
This paper investigates systems that steganographically embed information in the “noise” created by automatic translation of natural language documents. The main thrust of the work focuses on two problems – generation of plausible steganographic texts and avoiding transmission of the original source for stego objects. Because the inherent redundancy of
Grothoff, Christian   +4 more
openaire   +3 more sources

Z2Z4-Additive Perdect Codes in Steganography [PDF]

open access: yes, 2011
Steganography is an information hiding application which aims to hide secret data imperceptibly into a cover object. In this paper, we describe a novel coding method based on Z2Z4-additive codes in which data is embedded by distorting each cover ...
Rifà Coma, Josep   +2 more
core  

Multi-Level Steganography: Improving Hidden Communication in Networks

open access: yes, 2012
The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the ...
Fraczek, Wojciech   +2 more
core   +2 more sources

Image Steganography

open access: yes, 2021
Steganography is the process used hide the existence of information during transmission. Cover mediums like text, image, audio, and video protocols are used to hide the secret information. This process helps to provide secret communication between two parties.
Sana Parveen K   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy