-
1
-
2
-
3
-
4
Generation-based linguistic steganography with controllable security
Published 2022-06-01Subjects: “…generation-based linguistic steganography…”
Get full text
Article -
5
RETRACTED: Computer steganography and its basic principles
Published 2024-01-01Get full text
Article -
6
Multistage Encryption for Text Using Steganography and Cryptography
Published 2023-03-01“…Finally, our research provides more security because of the mixture between cryptography and steganography. …”
Get full text
Article -
7
An audio steganography algorithm based on segment-STC
Published 2019-07-01Subjects: Get full text
Article -
8
Digital steganography model and its formal description
Published 2020-06-01Subjects: “…steganography…”
Get full text
Article -
9
Computationally secure steganography based on speech synthesis
Published 2022-06-01Subjects: “…audio steganography…”
Get full text
Article -
10
Image vaccine against steganography in encrypted domain
Published 2025-02-01Subjects: Get full text
Article -
11
Implementation of Coding Theory with The Extended Hamming Code in Steganography
Published 2024-01-01“…In this article, we implement data security using a combination of coding theory and steganography. The code used is an extended Hamming code [8.4]. …”
Get full text
Article -
12
Steganography based on parameters’ disturbance of spatial image transform
Published 2017-10-01Subjects: “…steganography…”
Get full text
Article -
13
On Max-Plus Algebra and Its Application on Image Steganography
Published 2018-01-01“…We propose a new steganography method to hide an image into another image using matrix multiplication operations on max-plus algebra. …”
Get full text
Article -
14
Wav-audio steganography algorithm based on amplitude modifying
Published 2014-10-01“…Algorithms in different effective domains are analysed,and a wav-audio steganography algorithm based on amplitude modifying is proposed.The secret audio is scrambled through a random number generator.Amplitude values of each sampling point group are compared in original audio.While amplitude values are modified,the secret information bits are embedded.Embedding strength can be adjusted according to the key.Simulation results demonstrate that hiding capacity of this algorithm is large and good invisibility can be achieved.The anti-steganalysis ability of this algorithm is good and blind extraction can be realized.…”
Get full text
Article -
15
Generative Image Steganography via Encoding Pose Keypoints
Published 2024-12-01“…Existing generative image steganography methods typically encode secret information into latent vectors, which are transformed into the entangled features of generated images. …”
Get full text
Article -
16
Audio steganography by quantization index modulation in the DCT domain
Published 2009-01-01Subjects: Get full text
Article -
17
Binary image steganography method based on layered embedding
Published 2021-10-01Subjects: “…steganography…”
Get full text
Article -
18
Effectiveness of the Spatial Domain Techniques in Digital Image Steganography
Published 2024-03-01“…Since its inception in the 1990s till the present, digital steganography has a lengthy history. Early steganography focused primarily on imperceptibility, security and embedding capacity. …”
Get full text
Article -
19
Generative steganography method based on auto-generation of contours
Published 2021-09-01Subjects: “…generative steganography…”
Get full text
Article -
20
Chosen-key extracting attack to random LSB steganography
Published 2010-01-01Subjects: “…steganography…”
Get full text
Article