Results 11 to 20 of about 5,924 (276)

Coverless Image Steganography Based on Generative Adversarial Network

open access: yesMathematics, 2020
Traditional image steganography needs to modify or be embedded into the cover image for transmitting secret messages. However, the distortion of the cover image can be easily detected by steganalysis tools which lead the leakage of the secret message. So
Jiaohua Qin   +5 more
doaj   +3 more sources

Coverless Image Steganography: A Survey

open access: yesIEEE Access, 2019
With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most ...
Jiaohua Qin   +4 more
doaj   +3 more sources

JPEG steganography with particle swarm optimization accelerated by AVX [PDF]

open access: yes, 2020
Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography.
Bramas B   +7 more
core   +1 more source

Data Protection Using Optical System and Steganography Tool

open access: yes2023 International Conference on Next Generation Electronics (NEleX), 2023
Abstract Steganography, which is the art of hiding secret information, is widely used by researchers for the last few decades. However, maximum people use commercially available stenography tools due to their easy availability. In most of these tools, it is quite easy to decrypt hidden information using a different process.
Anirban Patra   +3 more
openaire   +2 more sources

A Natural Language Steganography Technique for Text Hiding Using LSB's [PDF]

open access: yesEngineering and Technology Journal, 2008
Steganography is the art of hiding, and transmitting information usingapparently innocent carrier without expose any suspicion. This paper present anatural language steganography technique, which is different from all the naturallanguage steganography ...
Hanaa M. Salman
doaj   +1 more source

The principles of building a parallel program for steganographic file protection [PDF]

open access: yesE3S Web of Conferences, 2023
In the modern era, the unprecedented growth of data and its consequential demands on transmission and storage systems have highlighted the necessity for efficient and secure information processing mechanisms.
Nuriev Marat   +3 more
doaj   +1 more source

Study and Analysis of Text Steganography Tools [PDF]

open access: yesInternational Journal of Computer Network and Information Security, 2013
Maintain the security of the secret informat ion", this words has been a great challenge in our day to day life. Sender can send messages regularly through a co mmunicat ion channel like Internet, draws the attention of third parties, hackers and crackers, perhaps causing attempts to break and expose the unusual messages.
Indradip Banerjee   +2 more
openaire   +1 more source

A novel steganography approach for audio files [PDF]

open access: yes, 2020
We present a novel robust and secure steganography technique to hide images into audio files aiming at increasing the carrier medium capacity. The audio files are in the standard WAV format, which is based on the LSB algorithm while images are ...
Abdulrazzaq, Sazeen T   +2 more
core   +1 more source

Hiding Techniques using Mp3 [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2010
In last years, Steganography techniques involving audio file formats appear to be increasing in popularity. This may be attributed to the fact that current steganalysis tools available to the general public fall short when applied to audio files. Another
Shyma Mohammed, Ahmed Nori
doaj   +1 more source

Code wars: steganography, signals intelligence, and terrorism [PDF]

open access: yes, 2003
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been ...
Alex P. Schmid   +11 more
core   +2 more sources

Home - About - Disclaimer - Privacy