Results 51 to 60 of about 23,715 (170)
COMPARISON OF DIGITAL IMAGE STEGANOGRAPHY METHODS
Steganography is a method of hiding information in other information of different format (container). There are many steganography techniques with various types of container.
S. A. Seyyedi, R. Kh. Sadykhov
doaj
A Novel LSB Steganography Technique Using Image Segmentation [PDF]
Steganography is a process to hide data inside a cover file mostly used in media files like image, video, and audio files. Least significant bit (LSB) steganography is a technique where the least significant bits of pixels are used for information hiding.
Yasir Yakup Demircan, Serhat Ozekes
doaj +3 more sources
Image steganography is a technology that hides sensitive information into an image. The traditional image steganography method tends to securely embed secret information in the host image so that the payload capacity is almost ignored and the ...
Xintao Duan +5 more
doaj +1 more source
Image steganography constitutes a specific form of steganography wherein an image is employed as the concealing medium. Medical Image Steganography represents a distinctive subfield within the broader domain of Image Steganography.
Hayder A. Hadi +2 more
doaj +1 more source
A Survey on Crypto-Steganographic Schemes and A Use Case in Healthcare System
Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks.
Mei Ling Phang, Swee Huay Heng
doaj +1 more source
Recent Advances of Image Steganography With Generative Adversarial Networks
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success. There have been increasing research achievements based on GAN in the field of computer vision and natural language processing.
Jia Liu +6 more
doaj +1 more source
Approaches to obtaining fingerprints of steganography tools which embed message in fixed positions
Recently, more and more steganography tools are exploited to embed malicious code into images by attackers, which bring harm to society. Thus, it has been a tricky problem, for which needs to detect the stego-images correctly.
Pengjie Cao +3 more
doaj +1 more source
LSB Steganography using Dual Layer for Text Crypto-Stego [PDF]
Cryptography and Steganography are two main components of information security. Utilizing encryption and Steganography to establish many layers of protection is a commendable approach.
Abd Zaid Mustafa M. +2 more
doaj +1 more source
High-Capacity Image Steganography Based on Improved Xception
The traditional cover modification steganography method only has low steganography ability. We propose a steganography method based on the convolutional neural network architecture (Xception) of deep separable convolutional layers in order to solve this ...
Xintao Duan +4 more
doaj +1 more source
Steganography conceals the secret message into the cover media, generating a stego media which can be transmitted on public channels without drawing suspicion. As its countermeasure, steganalysis mainly aims to detect whether the secret message is hidden in a given media. Although the steganography techniques are improving constantly, the sophisticated
Xu, Yong +4 more
openaire +2 more sources

