-
1
Digital steganography model and its formal description
Published 2020-06-01Subjects: “…steganography…”
Get full text
Article -
2
A robust audio steganography algorithm based on differential evolution
Published 2021-11-01Subjects: “…audio steganography…”
Get full text
Article -
3
A COMPUTATIONAL SYSTEM FOR EVALUATING HUMAN PERCEPTION IN VIDEO STEGANOGRAPHY
Published 2024-12-01Subjects: “…steganography…”
Get full text
Article -
4
Computationally secure steganography based on speech synthesis
Published 2022-06-01Subjects: “…audio steganography…”
Get full text
Article -
5
An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
Published 2024-12-01Subjects: Get full text
Article -
6
-
7
Image vaccine against steganography in encrypted domain
Published 2025-02-01Subjects: Get full text
Article -
8
Steganalysis based on transfer learning
Published 2017-01-01Subjects: “…steganography…”
Get full text
Article -
9
-
10
Lightweight Models for Real-Time Steganalysis: A Comparison of MobileNet, ShuffleNet, and EfficientNet
Published 2024-12-01Subjects: Get full text
Article -
11
IMPLEMENTATION OF MESSAGE EMBEDDING INTO VIDEO USING RSA AND LSB2BIT ALGORITHMS
Published 2024-12-01Subjects: “…steganography…”
Get full text
Article -
12
Steganalysis of JPEG images using non-linear residuals
Published 2023-01-01Subjects: Get full text
Article -
13
Steganalysis for stegotext based on text redundancy
Published 2009-01-01Subjects: “…steganography…”
Get full text
Article -
14
-
15
DGANS:robustness image steganography model based on double GAN
Published 2020-01-01Subjects: “…image steganography…”
Get full text
Article -
16
Invertible secret image sharing scheme based on improved FEMD
Published 2019-07-01Subjects: Get full text
Article -
17
Adaptive JPEG steganography based on distortion cost updating
Published 2017-09-01Subjects: Get full text
Article -
18
Coverless Steganography for Face Recognition Based on Diffusion Model
Published 2024-01-01Subjects: Get full text
Article -
19
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01Subjects: “…Steganography…”
Get full text
Article -
20
Steganography based on parameters’ disturbance of spatial image transform
Published 2017-10-01Subjects: “…steganography…”
Get full text
Article