Results 61 to 70 of about 23,715 (170)

Image Steganography

open access: yesInternational Journal of Recent Technology and Engineering (IJRTE), 2020
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The advantage of steganography is that the intended secret message does not attract attention to itself as an object of scrutiny. Steganography is concerned both with concealing the fact that a secret message is being sent and its
Yendluri Lohith Jayasurya   +2 more
openaire   +1 more source

Understandable Steganography

open access: yesInternational Journal of Engineering & Technology, 2018
For hiding information in a digitalized object Steganography is an important technique. It is a special kind of scientific technique which involves the secret information communication inside suitable cover objects of multimedia like image files, audio or videos. The embedded data and its existence are hidden with the help of Steganography.
Indu Maurya, S K Gupta
openaire   +2 more sources

An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)

open access: yesJISR on Computing
Text teganography is a method used to hide confidential messages in a message's text without arousing suspicion. This technique has been used in the past, from ancient Greece's scytale tool to modern methods such as Lempel-Ziv-Welch compression and ...
Kisakye Diana Michelle   +2 more
doaj   +1 more source

PIXEL PATTERN BASED STEGANOGRAPHY ON IMAGES [PDF]

open access: yesICTACT Journal on Image and Video Processing, 2015
One of the drawback of most of the existing steganography methods is that it alters the bits used for storing color information. Some of the examples include LSB or MSB based steganography.
R. Rejani, D. Murugan, Deepu V. Krishnan
doaj  

Robust Image Steganography Based on Prior Distribution Resistant to JPEG Compression [PDF]

open access: yesJisuanji gongcheng
Because the compression process of the network channel is unknown, attacks on the image after social network transmission are difficult to predict. Therefore, studying the steganography algorithm resistant to the compression distortion of a channel is ...
LIU Ting, DONG Li, YAN Diqun, WANG Rangding
doaj   +1 more source

Image Steganography

open access: yesInternational Journal for Research in Applied Science and Engineering Technology
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding by information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet.
Rashmeet Kaur   +2 more
openaire   +1 more source

Video Steganography

open access: yesInternational Research Journal of Modernization in Engineering Technology and Science
In recent era, steganography has gained a huge popularity due to its property of data covertly. It basically hides data in a medium in textual form. As it drawing more impulse due it's ability of masking large amount of data. This paper furnishes the leading-edge technique and the methodologies concerning video as convert communication channel In this ...
openaire   +2 more sources

Detection of Steganography-Producing Software Artifacts on Crime-Related Seized Computers

open access: yesJournal of Digital Forensics, Security and Law, 2009
Steganography is the art and science of hiding information within information so that an observer does not know that communication is taking place. Bad actors passing information using steganography are of concern to the national security establishment ...
Asawaree Kulkarni   +3 more
doaj  

Adaptive JPEG steganography based on distortion cost updating

open access: yesTongxin xuebao, 2017
Previous adaptive JPEG steganography algorithms mostly calculate image distortion before secret information embedding,so they can’t dynamically adjust distortion costs.Considering the mutual impacts during embedding,an adaptive JPEG steganography ...
Guang-ming TANG   +3 more
doaj  

Home - About - Disclaimer - Privacy