Results 31 to 40 of about 5,924 (276)
Work design improvement at Miroad Rubber Industries Sdn. Bhd. [PDF]
Erul Food Industries known as Salaiport Industry is a family-owned company and was established on July 2017. Salaiport Industry apparently moved to a new place at Pedas, Negeri Sembilan.
Chen, Xue Chee +7 more
core
A Comprehensive Image Steganography Tool using LSB Scheme [PDF]
As a consequence of the fact, transmitting data has been fast and easy these days due to the development of the Internet. Where internet is the most important medium for confidential and non-confidential communications. Security is the major matter for these communications and steganography is the art of hiding and transmitting secret messages through ...
openaire +2 more sources
Combining Invisible Unicode Characters To Hide Information In A Text Document
Steganography develops tools and methods for hiding the fact of message transmission. The first traces of steganographic methods are lost in ancient times.
N.R. Zaynalov +4 more
doaj +1 more source
Steganography is the approach for hiding any secret message in a variety of multimedia carriers like images, audio or video files. Whenever we are hiding a data, it is very important to make it invisible, so that it could be protected.
P. Mohan Kumar, K. L. hanmuganathan
doaj +1 more source
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca +3 more
core +1 more source
On Improving Distortion Functions for JPEG Steganography
This paper proposes a framework to improve the existing distortion functions designed for JPEG steganography, which results in a better capability of countering steganalysis.
Zichi Wang +4 more
doaj +1 more source
Coverless image steganography based on DenseNet feature mapping
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) methods achieve excellent robustness under non-
Qiang Liu +4 more
doaj +1 more source
Secure and Efficient Coverless Image Steganography Algorithm Based on Higher Frequency Pixel with Tribonacci Matrix [PDF]
With recent rapid progress in information technology, the security of information exchanged via the Internet has become one of the most important problems. Steganography is a powerful solution for this problem.
khlood hamza +2 more
doaj +1 more source
Approach to steganography storage in removable media file system
Problems of hidden storage and transmission of information are successfully solved by using steganography. The most common steganographic maskers for transmitting and storing information at a given time are media files, such as photos, videos, and audio ...
Mihail V. Malahov, Pavel V. Slipenchuk
doaj +1 more source
Steganography: a class of secure and robust algorithms [PDF]
This research work presents a new class of non-blind information hiding algorithms that are stego-secure and robust. They are based on some finite domains iterations having the Devaney's topological chaos property.
Bahi, Jacques M. +2 more
core +4 more sources

