Results 31 to 40 of about 5,924 (276)

Work design improvement at Miroad Rubber Industries Sdn. Bhd. [PDF]

open access: yes, 2020
Erul Food Industries known as Salaiport Industry is a family-owned company and was established on July 2017. Salaiport Industry apparently moved to a new place at Pedas, Negeri Sembilan.
Chen, Xue Chee   +7 more
core  

A Comprehensive Image Steganography Tool using LSB Scheme [PDF]

open access: yesInternational Journal of Image, Graphics and Signal Processing, 2015
As a consequence of the fact, transmitting data has been fast and easy these days due to the development of the Internet. Where internet is the most important medium for confidential and non-confidential communications. Security is the major matter for these communications and steganography is the art of hiding and transmitting secret messages through ...
openaire   +2 more sources

Combining Invisible Unicode Characters To Hide Information In A Text Document

open access: yesJOIV: International Journal on Informatics Visualization, 2020
Steganography develops tools and methods for hiding the fact of message transmission. The first traces of steganographic methods are lost in ancient times.
N.R. Zaynalov   +4 more
doaj   +1 more source

Developing a Secure Image Steganographic System Using TPVD Adaptive LSB Matching Revisited Algorithm for Maximizing the Embedding Rate

open access: yesJournal of Telecommunications and Information Technology, 2023
Steganography is the approach for hiding any secret message in a variety of multimedia carriers like images, audio or video files. Whenever we are hiding a data, it is very important to make it invisible, so that it could be protected.
P. Mohan Kumar, K. L. hanmuganathan
doaj   +1 more source

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

open access: yes, 2014
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca   +3 more
core   +1 more source

On Improving Distortion Functions for JPEG Steganography

open access: yesIEEE Access, 2018
This paper proposes a framework to improve the existing distortion functions designed for JPEG steganography, which results in a better capability of countering steganalysis.
Zichi Wang   +4 more
doaj   +1 more source

Coverless image steganography based on DenseNet feature mapping

open access: yesEURASIP Journal on Image and Video Processing, 2020
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) methods achieve excellent robustness under non-
Qiang Liu   +4 more
doaj   +1 more source

Secure and Efficient Coverless Image Steganography Algorithm Based on Higher Frequency Pixel with Tribonacci Matrix [PDF]

open access: yesJES: Journal of Engineering Sciences
With recent rapid progress in information technology, the security of information exchanged via the Internet has become one of the most important problems. Steganography is a powerful solution for this problem.
khlood hamza   +2 more
doaj   +1 more source

Approach to steganography storage in removable media file system

open access: yesБезопасность информационных технологий, 2020
Problems of hidden storage and transmission of information are successfully solved by using steganography. The most common steganographic maskers for transmitting and storing information at a given time are media files, such as photos, videos, and audio ...
Mihail V. Malahov, Pavel V. Slipenchuk
doaj   +1 more source

Steganography: a class of secure and robust algorithms [PDF]

open access: yes, 2011
This research work presents a new class of non-blind information hiding algorithms that are stego-secure and robust. They are based on some finite domains iterations having the Devaney's topological chaos property.
Bahi, Jacques M.   +2 more
core   +4 more sources

Home - About - Disclaimer - Privacy