Showing 1 - 20 results of 85 for search '"steganography"', query time: 0.05s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Generation-based linguistic steganography with controllable security by Jiameng MEI, Yanzhen REN, Lina WANG

    Published 2022-06-01
    Subjects: “…generation-based linguistic steganography…”
    Get full text
    Article
  5. 5
  6. 6

    Multistage Encryption for Text Using Steganography and Cryptography by Mohammed Majid Msallam, Fayez Aldoghan

    Published 2023-03-01
    “…Finally, our research provides more security because of the mixture between cryptography and steganography. …”
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Implementation of Coding Theory with The Extended Hamming Code in Steganography by Nurul Jannah, Nur Hamid

    Published 2024-01-01
    “…In this article, we implement data security using a combination of coding theory and steganography. The code used is an extended Hamming code [8.4]. …”
    Get full text
    Article
  12. 12
  13. 13

    On Max-Plus Algebra and Its Application on Image Steganography by Kiswara Agung Santoso, Fatmawati, Herry Suprajitno

    Published 2018-01-01
    “…We propose a new steganography method to hide an image into another image using matrix multiplication operations on max-plus algebra. …”
    Get full text
    Article
  14. 14

    Wav-audio steganography algorithm based on amplitude modifying by 邹明光, 李芝棠

    Published 2014-10-01
    “…Algorithms in different effective domains are analysed,and a wav-audio steganography algorithm based on amplitude modifying is proposed.The secret audio is scrambled through a random number generator.Amplitude values of each sampling point group are compared in original audio.While amplitude values are modified,the secret information bits are embedded.Embedding strength can be adjusted according to the key.Simulation results demonstrate that hiding capacity of this algorithm is large and good invisibility can be achieved.The anti-steganalysis ability of this algorithm is good and blind extraction can be realized.…”
    Get full text
    Article
  15. 15

    Generative Image Steganography via Encoding Pose Keypoints by Yi Cao, Wentao Ge, Chengsheng Yuan, Quan Wang

    Published 2024-12-01
    “…Existing generative image steganography methods typically encode secret information into latent vectors, which are transformed into the entangled features of generated images. …”
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Effectiveness of the Spatial Domain Techniques in Digital Image Steganography by Rosshini Selvamani, Yusliza Yusoff

    Published 2024-03-01
    “…Since its inception in the 1990s till the present, digital steganography has a lengthy history. Early steganography focused primarily on imperceptibility, security and embedding capacity. …”
    Get full text
    Article
  19. 19
  20. 20