Results 31 to 40 of about 7,152 (277)

Image Steganography: A Review of the Recent Advances

open access: yesIEEE Access, 2021
Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes.
Nandhini Subramanian   +3 more
doaj   +1 more source

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

open access: yes, 2014
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca   +3 more
core   +1 more source

Security in Wireless Sensor Networks: Issues and Challenges [PDF]

open access: yes, 2006
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military.
Delic, H, Ersoy, C, Onel, T, Onur, Ertan
core   +3 more sources

An Evolutionary Computing Enriched RS Attack Resilient Medical Image Steganography Model for Telemedicine Applications

open access: yes, 2018
The recent advancement in computing technologies and resulting vision based applications have gives rise to a novel practice called telemedicine that requires patient diagnosis images or allied information to recommend or even perform diagnosis practices
Abdelrahim, Elsaid MD.   +1 more
core   +1 more source

JPEG steganography: A performance evaluation of quantization tables [PDF]

open access: yes, 2009
The two most important aspects of any image based steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and efficiency of using optimized quantization tables instead of default JPEG ...
Al-Mohammad, A, Ghinea, G, Hierons, RM
core   +1 more source

Chaos Based Encryption Technique for Compressed H264/AVC Videos

open access: yesIEEE Access, 2022
Saving videos streaming from the unlawful users became an urgent claim. Cryptography and Steganography are the most important and indispensable processes to protect and embed the multimedia data during the transfer or storage process.
M. A. El-Mowafy   +4 more
doaj   +1 more source

Computationally secure steganography based on speech synthesis

open access: yes网络与信息安全学报, 2022
The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography ...
Menghan LI   +3 more
doaj   +3 more sources

Research on Covert Communication Security Based on Screen Content Coding

open access: yesIEEE Access, 2020
Covert transmission technology is a new direction in the field of information security technology. It can protect copyright and authentication sources and integrity in an open network environment, and ensure the security of digital media content through ...
Zhe Liu, He Chen, Songlin Sun
doaj   +1 more source

An overview on audio steganography techniques [PDF]

open access: yes, 2012
Steganography is a form of security technique through obscurity; the science and art of hiding the existence of a message between sender and intended recipient.
Abdul Manaf, Azizah   +2 more
core  

Wavelet Based Color Video Steganography [PDF]

open access: yesInternational Journal of Engineering and Technology, 2016
This paper describes the algorithm developed with the aim to hide a "secret" color video sequence within another color video sequence. An approach to apply a wavelet transform in order to decompose the cover video sequence and then replace the less significant wavelet band with "secret" video frames has been implemented and tested. On the receiver side,
Anush Kolakalur   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy