Results 41 to 50 of about 56,459 (364)

A study on the false positive rate of Stegdetect [PDF]

open access: yes, 2013
In this paper we analyse Stegdetect, one of the well-known image steganalysis tools, to study its false positive rate. In doing so, we process more than 40,000 images randomly downloaded from the Internet using Google images, together with 25,000 images ...
Benjamin Aziz   +13 more
core   +1 more source

Learning to Generate Steganographic Cover for Audio Steganography Using GAN

open access: yesIEEE Access, 2021
Audio steganography aims to exploit the human auditory redundancy to embed the secret message into cover audio, without raising suspicion when hearing it. However, recent studies have shown that the existing audio steganography can be easily exposed with
Lang Chen   +3 more
doaj   +1 more source

CHALLENGES IN MULTI-LAYER DATA SECURITY FOR VIDEO STEGANOGRAPHY

open access: yesAsia-Pacific Journal of Information Technology and Multimedia, 2018
The steganography is prone to number of attacks such as geomatical, salt & pepper, gaussian, median filtering, attacks. To overcome these problems, the cryptography and error correction codes are comes in the pictures and hybrid with steganography ...
Samar Kamil   +3 more
doaj   +1 more source

Arabic Language Text Steganography Based on Singular Value Decomposition (SVD) [PDF]

open access: yesEngineering and Technology Journal, 2016
With the fast development of internet innocent over communication in the network environment has become an important research direction. Steganography means that secret information is embedded into cover data imperceptibly for transmission.
Hanaa M. Ahmed, a A. A. Khohder, Maisa
doaj   +1 more source

The MedSupport Multilevel Intervention to Enhance Support for Pediatric Medication Adherence: Development and Feasibility Testing

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard   +8 more
wiley   +1 more source

Multi-Level Steganography: Improving Hidden Communication in Networks

open access: yes, 2012
The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the ...
Fraczek, Wojciech   +2 more
core   +2 more sources

Stereotactic Body Radiation Therapy for Pediatric, Adolescent, and Young Adult Patients With Osteosarcoma: Local Control Outcomes With Dosimetric Analysis

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background/Objectives Osteosarcoma is a radioresistant tumor that may benefit from stereotactic body radiation therapy (SBRT) for locoregional control in metastatic/recurrent disease. We report institutional practice patterns, outcomes, toxicity, and failures in osteosarcoma patients treated with SBRT.
Jenna Kocsis   +13 more
wiley   +1 more source

Computationally secure steganography based on speech synthesis

open access: yes网络与信息安全学报, 2022
The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography ...
Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU
doaj   +3 more sources

Survey of the Use of Steganography over the Internet [PDF]

open access: yesInformatică economică, 2011
This paper addressesthe use of Steganography over the Internet by terrorists. There were ru-mors in the newspapers that Steganography is being used to covert communication between terrorists, without presenting any scientific proof.
Lavinia Mihaela DINCA
doaj  

A Cover Selection HEVC Video Steganography Based on Intra Prediction Mode

open access: yesIEEE Access, 2019
Existing video steganography puts much emphasis on the design of algorithms such as mapping rules or distortion functions, thereby ignoring the selection of cover to embed secret information.
Jie Wang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy