Results 11 to 20 of about 5,924 (276)
Coverless Image Steganography Based on Generative Adversarial Network
Traditional image steganography needs to modify or be embedded into the cover image for transmitting secret messages. However, the distortion of the cover image can be easily detected by steganalysis tools which lead the leakage of the secret message. So
Jiaohua Qin +5 more
doaj +3 more sources
Coverless Image Steganography: A Survey
With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most ...
Jiaohua Qin +4 more
doaj +3 more sources
JPEG steganography with particle swarm optimization accelerated by AVX [PDF]
Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography.
Bramas B +7 more
core +1 more source
Data Protection Using Optical System and Steganography Tool
Abstract Steganography, which is the art of hiding secret information, is widely used by researchers for the last few decades. However, maximum people use commercially available stenography tools due to their easy availability. In most of these tools, it is quite easy to decrypt hidden information using a different process.
Anirban Patra +3 more
openaire +2 more sources
A Natural Language Steganography Technique for Text Hiding Using LSB's [PDF]
Steganography is the art of hiding, and transmitting information usingapparently innocent carrier without expose any suspicion. This paper present anatural language steganography technique, which is different from all the naturallanguage steganography ...
Hanaa M. Salman
doaj +1 more source
The principles of building a parallel program for steganographic file protection [PDF]
In the modern era, the unprecedented growth of data and its consequential demands on transmission and storage systems have highlighted the necessity for efficient and secure information processing mechanisms.
Nuriev Marat +3 more
doaj +1 more source
Study and Analysis of Text Steganography Tools [PDF]
Maintain the security of the secret informat ion", this words has been a great challenge in our day to day life. Sender can send messages regularly through a co mmunicat ion channel like Internet, draws the attention of third parties, hackers and crackers, perhaps causing attempts to break and expose the unusual messages.
Indradip Banerjee +2 more
openaire +1 more source
A novel steganography approach for audio files [PDF]
We present a novel robust and secure steganography technique to hide images into audio files aiming at increasing the carrier medium capacity. The audio files are in the standard WAV format, which is based on the LSB algorithm while images are ...
Abdulrazzaq, Sazeen T +2 more
core +1 more source
Hiding Techniques using Mp3 [PDF]
In last years, Steganography techniques involving audio file formats appear to be increasing in popularity. This may be attributed to the fact that current steganalysis tools available to the general public fall short when applied to audio files. Another
Shyma Mohammed, Ahmed Nori
doaj +1 more source
Code wars: steganography, signals intelligence, and terrorism [PDF]
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been ...
Alex P. Schmid +11 more
core +2 more sources

