Showing 41 - 60 results of 85 for search '"steganography"', query time: 0.05s Refine Results
  1. 41

    A Safe and Secured Medical Textual Information Using an Improved LSB Image Steganography by Roseline Oluwaseun Ogundokun, Oluwakemi Christiana Abikoye

    Published 2021-01-01
    “…The result of this implementation shows that the modified LSB image steganography outperformed the standard LSB technique with a higher PSNR value and lower MSE value when compared with previous research works. …”
    Get full text
    Article
  2. 42

    Succinct scheme of DCT coefficient selection towards enhanced security of JPEG image steganography by Kang WANG, Bei-bei LIU, Shuo-wei LIU, Yong-jian HU

    Published 2016-09-01
    “…Based on the characteristics of JPEG compression,a succinct and effective scheme of DCT coefficients selection was proposed,in which not only the non-zero AC coefficients but also part of the zero coefficients were exploited.Moreover,the scheme embedded messages in a different order than the conventional practice and gave priority to the low frequency coefficients so as to achieve enhanced security.The embedding manners of two typical steganographic algorithms(EPES and APPM)were extended from the spatial to the compression domain and the proposed scheme was applied to them for coefficient selection and embedding.Experimental results showed that larger capacity and better security were achieved compare to three classical steganographic algorithms(JSteg,F5 and nsF5)and one current steganographic algorithm based on STC framework(LPD).The proposed coefficient se-lection and embedding scheme can effectively improved the performance of some classic DCT domain steg-anographic methods in terms of capacity and security.The scheme was general and could be easily applied to dif-ferent steganography methods.…”
    Get full text
    Article
  3. 43
  4. 44
  5. 45
  6. 46

    AFD and chaotic map‐based integrated approach for ECG compression, steganography and encryption in E‐healthcare paradigm by Neetika Soni, Indu Saini, Butta Singh

    Published 2021-07-01
    “…Later, chaotic map‐based steganography and encryption are proposed on the AFD coefficients to secure the confidential information and the signal itself. …”
    Get full text
    Article
  7. 47
  8. 48
  9. 49
  10. 50

    Steganalysis based on transfer learning by Deng-pan YE, Fang-fang MA, Yuan MEI

    Published 2017-01-01
    Subjects: “…steganography…”
    Get full text
    Article
  11. 51

    An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer by Rohit Tanwar, Kulvinder Singh, Mazdak Zamani, Amit Verma, Prashant Kumar

    Published 2019-01-01
    “…Being easy to understand and simple to implement, substitution technique of performing steganography has gain wide popularity among users as well as attackers. …”
    Get full text
    Article
  12. 52
  13. 53
  14. 54
  15. 55

    Steganalysis for stegotext based on text redundancy by LUO Gang, SUN Xing-ming

    Published 2009-01-01
    Subjects: “…steganography…”
    Get full text
    Article
  16. 56
  17. 57

    A New Method of Image Steganography Using 7th Bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image by Kamaldeep Joshi, Swati Gill, Rajkumar Yadav

    Published 2018-01-01
    “…This proposed image steganography showed interesting, promising results when compared with other existing techniques.…”
    Get full text
    Article
  18. 58
  19. 59

    WPD-based blind image steganalysis by LUO Xiang-yang1, LIU Fen-lin1, WANG Dao-shun2

    Published 2008-01-01
    Subjects: “…steganography…”
    Get full text
    Article
  20. 60