Results 51 to 60 of about 23,715 (170)

COMPARISON OF DIGITAL IMAGE STEGANOGRAPHY METHODS

open access: yesInformatika, 2016
Steganography is a method of hiding information in other information of different format (container). There are many steganography techniques with various types of container.
S. A. Seyyedi, R. Kh. Sadykhov
doaj  

A Novel LSB Steganography Technique Using Image Segmentation [PDF]

open access: yesJournal of Universal Computer Science
Steganography is a process to hide data inside a cover file mostly used in media files like image, video, and audio files. Least significant bit (LSB) steganography is a technique where the least significant bits of pixels are used for information hiding.
Yasir Yakup Demircan, Serhat Ozekes
doaj   +3 more sources

A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network

open access: yesIEEE Access, 2020
Image steganography is a technology that hides sensitive information into an image. The traditional image steganography method tends to securely embed secret information in the host image so that the payload capacity is almost ignored and the ...
Xintao Duan   +5 more
doaj   +1 more source

AN ENHANCED APPROACH UTILIZING AN OPTIMIZED DISCRETE WAVELET TRANSFORM FOR IMAGE STEGANOGRAPHY IN MEDICAL IMAGING

open access: yesMağallaẗ Al-kūfaẗ Al-handasiyyaẗ
Image steganography constitutes a specific form of steganography wherein an image is employed as the concealing medium. Medical Image Steganography represents a distinctive subfield within the broader domain of Image Steganography.
Hayder A. Hadi   +2 more
doaj   +1 more source

A Survey on Crypto-Steganographic Schemes and A Use Case in Healthcare System

open access: yesJournal of Engineering Technology and Applied Physics, 2019
Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks.
Mei Ling Phang, Swee Huay Heng
doaj   +1 more source

Recent Advances of Image Steganography With Generative Adversarial Networks

open access: yesIEEE Access, 2020
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success. There have been increasing research achievements based on GAN in the field of computer vision and natural language processing.
Jia Liu   +6 more
doaj   +1 more source

Approaches to obtaining fingerprints of steganography tools which embed message in fixed positions

open access: yesForensic Science International: Reports, 2019
Recently, more and more steganography tools are exploited to embed malicious code into images by attackers, which bring harm to society. Thus, it has been a tricky problem, for which needs to detect the stego-images correctly.
Pengjie Cao   +3 more
doaj   +1 more source

LSB Steganography using Dual Layer for Text Crypto-Stego [PDF]

open access: yesBIO Web of Conferences
Cryptography and Steganography are two main components of information security. Utilizing encryption and Steganography to establish many layers of protection is a commendable approach.
Abd Zaid Mustafa M.   +2 more
doaj   +1 more source

High-Capacity Image Steganography Based on Improved Xception

open access: yesSensors, 2020
The traditional cover modification steganography method only has low steganography ability. We propose a steganography method based on the convolutional neural network architecture (Xception) of deep separable convolutional layers in order to solve this ...
Xintao Duan   +4 more
doaj   +1 more source

Deniable Steganography

open access: yes, 2022
Steganography conceals the secret message into the cover media, generating a stego media which can be transmitted on public channels without drawing suspicion. As its countermeasure, steganalysis mainly aims to detect whether the secret message is hidden in a given media. Although the steganography techniques are improving constantly, the sophisticated
Xu, Yong   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy