Results 21 to 30 of about 7,152 (277)

A Survey on different techniques of steganography

open access: yesMATEC Web of Conferences, 2016
Steganography is important due to the exponential development and secret communication of potential computer users over the internet. Steganography is the art of invisible communication to keep secret information inside other information. Steganalysis is
Kaur Harpreet, Rani Jyoti
doaj   +1 more source

CHALLENGES IN MULTI-LAYER DATA SECURITY FOR VIDEO STEGANOGRAPHY

open access: yesAsia-Pacific Journal of Information Technology and Multimedia, 2018
The steganography is prone to number of attacks such as geomatical, salt & pepper, gaussian, median filtering, attacks. To overcome these problems, the cryptography and error correction codes are comes in the pictures and hybrid with steganography ...
Samar Kamil   +3 more
doaj   +1 more source

Image Steganography in Wavelet Domain [PDF]

open access: yesPort Said Engineering Research Journal, 2017
Steganography is the science of hiding secret data within any kind of medium such as image, video, audio and document. The two main category of image steganography are spatial-based embedding and transform-based embedding.
Aisha Elkafrawy   +2 more
doaj   +1 more source

A multi-image hiding technique in dilated video regions based on cooperative game-theoretic approach

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
This paper presents a cooperative game theory approach to design an optimal video steganography framework. An ideal and perfect video steganography system should provide enough space to embed the secret data without degrading the visual quality. However,
Suganthi Kumar, Rajkumar Soundrapandiyan
doaj   +1 more source

Review on DNA Cryptography [PDF]

open access: yes, 2019
Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods.
Mondal, Mandrita, Ray, Kumar S.
core   +3 more sources

The Pixogram: Addressing High Payload Demands for Video Steganography

open access: yesIEEE Access, 2019
This paper introduces the concept of a pixogram which makes possible a fresh approach to high payload video steganography. The pixogram allows for a new perspective by investigating the temporal changes that take place at the individual pixel level ...
Tamer Rabie, Mohammed Baziyad
doaj   +1 more source

High capacity steganographic method based upon JPEG [PDF]

open access: yes, 2008
The two most important aspects of any image-based steganographic system are the quality of the stegoimage and the capacity of the cover image. This paper proposes a novel and high capacity steganographic approach based on Discrete Cosine Transformation (
Al-Mohammad, A, Ghinea, G, Hierons, RM
core   +1 more source

Penyembunyian Data pada File Video Menggunakan Metode LSB dan DCT

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2014
Abstrak Penyembunyian data pada file video dikenal dengan istilah steganografi video. Metode steganografi yang dikenal diantaranya metode Least Significant Bit (LSB) dan Discrete Cosine Transform (DCT).
Mahmuddin Yunus, Agus Harjoko
doaj   +1 more source

Steganografi Video Digital dengan Algoritma LSB (Least Significant Bit) dan Rijndael

open access: yesJournal of Innovation Information Technology and Application, 2020
Steganography is the science and art of hiding information so that confidential information cannot be known by others, except the sender and receiver. This research is designed to create a steganography system on video with mp4 format.
Imam Riadi, Sunardi Sunardi, Dwi Aryanto
doaj   +1 more source

Deeply‐Recursive Attention Network for video steganography

open access: yesCAAI Transactions on Intelligence Technology, 2023
Video steganography plays an important role in secret communication that conceals a secret video in a cover video by perturbing the value of pixels in the cover frames. Imperceptibility is the first and foremost requirement of any steganographic approach.
Jiabao Cui   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy