Showing 21 - 40 results of 85 for search '"steganography"', query time: 0.05s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25
  6. 26

    A Formula Adaptive Pixel Pair Matching Steganography Algorithm by Min Long, Fenfang Li

    Published 2018-01-01
    “…Pixel pair matching (PPM) is widely used in digital image steganography. As an important derivation, adaptive pixel pair matching method (APPM) offers low distortion and allows embedded digits in any notational system. …”
    Get full text
    Article
  7. 27
  8. 28
  9. 29
  10. 30
  11. 31

    Image steganography based on nonsubsampled Contourlet transform and Hill cipher by Shuliang SUN

    Published 2016-06-01
    “…A novel image steganography was proposed,which was based on nonsubsampled Contourlet transform (NSCT)and Hill cipher.Firstly,cover image was decomposed with NSCT.It provided a multi-scale and multi-directional representation of an image.One of subbands was selected to embed secret data.Then Hill cipher was applied to encrypt the secret message.How to find a proper cipher matrix was important in this way.The selected matrix should be inevitable and relatively prime to the number of alphabets.The skill of 2<sup>k</sup> correction was applied to ease the difference between cover and stego image.Experiment results show that both stego image and retrieved image have better image quality with the proposed approach than other methods.…”
    Get full text
    Article
  12. 32
  13. 33
  14. 34
  15. 35
  16. 36
  17. 37

    Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication by Jung-oh Park, Sanggeun Kim

    Published 2015-01-01
    “…Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed to many threats on the existing web environment. In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure), SN (serial number), and R value (random number) attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. …”
    Get full text
    Article
  18. 38

    A Novel Steganography Technique for SDTV-H.264/AVC Encoded Video by Christian Di Laura, Diego Pajuelo, Guillermo Kemper

    Published 2016-01-01
    “…This exemplifies that steganography is affordable in digital television.…”
    Get full text
    Article
  19. 39

    Optimize Image Steganography Based on Distinction Disparity Value and HMPSO to Ensure Confidentiality and Integrity by Ali Salem Ali, Suray Alsamaraee, Aya Ayad Hussein

    Published 2024-01-01
    “…Pressing challenges in the context of a steganography system include security, imperceptibility, and capacity issues. …”
    Get full text
    Article
  20. 40