EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"steganography"
Narrow search

Narrow search

Year of publication
Subject
All
Steganography 6 Steganalysis 3 steganography 3 Cryptography 2 Image Steganography 2 Information Security 2 Blind Steganalytic 1 Classifier Selection 1 Communication scheme 1 Cover Source Mismatch 1 DCT 1 DCT Coefficients 1 DNA computing 1 DNA cryptography 1 DNA replication 1 DNA steganography 1 Data Hiding 1 Data Mining 1 Digital images 1 Hyper-Chaotic Encryption 1 Identifiable Feature 1 Information Hiding 1 JPEG 1 JPEG Steganography 1 LSB 1 Machine Learning 1 Modification Way 1 Online Voting System 1 PLSB 1 Paradigm 1 Pattern formation 1 Privacy 1 ROI 1 RONI 1 Recognition 1 Secret Communication 1 Secret Information 1 Secure Communication 1 Secure Data Transfer 1 Spatial game 1
more ... less ...
Online availability
All
Undetermined 11 Free 4
Type of publication
All
Article 14 Book / Working Paper 1
Type of publication (narrower categories)
All
Article in journal 2 Aufsatz in Zeitschrift 2 Conference Paper 1
Language
All
English 13 Undetermined 2
Author
All
Zhao, Xianfeng 2 Zhu, Jie 2 Al Makhdhub, Dalal 1 Al Qahtani, Amal A. 1 Al Shabanat, Ghadah A. 1 Alomerini, Rawan S. 1 Cao, Yun 1 Ch., Rupa 1 Chen, Gong 1 Chen, Zhe 1 Evsutin, Oleg 1 Gao, Tiegang 1 Guan, Qingxiao 1 Haldar, Manas Kumar 1 Ismail, Sahar A. El-Rahman 1 Issac, Biju 1 Kokurina, Anna 1 Lavinia Mihaela DINCÄ‚ 1 Lu, Jicang 1 Luo, Xiangyang 1 Meščerjakov, Roman 1 Omair, Nouf M. 1 Poriye, Monika 1 Ragulskis, Minvydas 1 Ragulskis, Tautvydas 1 Reddy, V. Lokeswara 1 Rura, Lauretha 1 Stoyanova, Veselka T. 1 Tabusca, Alexandru 1 Upadhyaya, Shuchita 1 VASILESCU, Adrian 1 Xu, Xihao 1 Yang, Liang 1 Yang, Pengfei 1 Yu, Haibo 1 Zhang, Shun 1 Ziaukas, Pranas 1
more ... less ...
Published in...
All
International Journal of Digital Crime and Forensics (IJDCF) 5 Informatica Economica 2 International Journal of Electronic Government Research (IJEGR) 1 International Journal of Rough Sets and Data Analysis (IJRSDA) 1 International Journal of Technology Diffusion (IJTD) 1 International journal of applied management science : IJAMS 1 Journal of Information Systems & Operations Management 1 Journal of decision systems 1 Physica A: Statistical Mechanics and its Applications 1
more ... less ...
Source
All
Other ZBW resources 8 RePEc 4 ECONIS (ZBW) 2 EconStor 1
Showing 1 - 10 of 15
Cover Image
DNA-SKA : a DNA congruous secure symmetric key generation algorithm
Poriye, Monika; Upadhyaya, Shuchita - In: International journal of applied management science : IJAMS 15 (2023) 2, pp. 90-101
Persistent link: https://www.econbiz.de/10014306710
Saved in:
Cover Image
Steganography System Using LSB Methods
Stoyanova, Veselka T. - 2018
Steganography is the method of hiding message in a cover object for cover communication. The article deals with the … steganography system which hides text inside images without losing of data (BMP, PNG, TIFF and GIF). The secret message is hidden in …
Persistent link: https://www.econbiz.de/10011920464
Saved in:
Cover Image
Secure Steganography in JPEG Images Based on Histogram Modification and Hyper Chaotic System
Zhang, Shun; Gao, Tiegang; Yang, Liang; Xu, Xihao - In: International Journal of Digital Crime and Forensics (IJDCF) 10 (2018) 1, pp. 40-53
Security always plays an important role in the communication. Steganography, which conceals the process of … steganography scheme in JPEG images with high embedding capacity and low distortion to the cover image. It embeds the additional …
Persistent link: https://www.econbiz.de/10012043959
Saved in:
Cover Image
Approach to the selection of the best cover image for information embedding in JPEG images based on the principles of the optimality
Evsutin, Oleg; Kokurina, Anna; Meščerjakov, Roman - In: Journal of decision systems 27 (2018), pp. 256-264
Persistent link: https://www.econbiz.de/10012164208
Saved in:
Cover Image
A Steganalytic Scheme Based on Classifier Selection Using Joint Image Characteristics
Zhu, Jie; Guan, Qingxiao; Zhao, Xianfeng; Cao, Yun; … - In: International Journal of Digital Crime and Forensics (IJDCF) 9 (2017) 4, pp. 1-14
Steganalysis relies on steganalytic features and classification techniques. Because of the complexity and different characteristics of cover images, to make steganalysis more applicable toward detecting stego images in real applications, we need to train different classifiers so as to match...
Persistent link: https://www.econbiz.de/10012043950
Saved in:
Cover Image
Recognizing Substitution Steganography of Spatial Domain Based on the Characteristics of Pixels Correlation
Chen, Zhe; Lu, Jicang; Yang, Pengfei; Luo, Xiangyang - In: International Journal of Digital Crime and Forensics (IJDCF) 9 (2017) 4, pp. 48-61
substitution steganography from other types of steganographic algorithms. Finally, a substitution steganography recognition … substitution steganography in spatial domain efficiently, and the detection accuracy is better than existing algorithms. …
Persistent link: https://www.econbiz.de/10012043954
Saved in:
Cover Image
Improved Secure Data Transfer Using Video Steganographic Technique
Reddy, V. Lokeswara - In: International Journal of Rough Sets and Data Analysis … 4 (2017) 3, pp. 55-70
Information security using data hiding in video provides high embedding capacity and security. Steganography is one of … the oldest data protecting methodologies deals with the embedding of data. Video Steganography hides secret information …
Persistent link: https://www.econbiz.de/10012047385
Saved in:
Cover Image
Survey of the Use of Steganography over the Internet
Lavinia Mihaela DINCÄ‚ - In: Informatica Economica 15 (2011) 2, pp. 153-164
This paper addressesthe use of Steganography over the Internet by terrorists. There were ru-mors in the newspapers that … Steganography is being used to covert communication between terrorists, without presenting any scientific proof. Niels Provos and … conclusive enough other did not. This paper describes what Steganography is and what can be used for, various Steganography …
Persistent link: https://www.econbiz.de/10009416382
Saved in:
Cover Image
On More Paradigms of Steganalysis
Zhao, Xianfeng; Zhu, Jie; Yu, Haibo - In: International Journal of Digital Crime and Forensics (IJDCF) 8 (2016) 2, pp. 1-15
Up to now, most researches on steganalysis concentrate on one extreme case. Typically, the a priori knowledge of the embedding way and cover-media is assumed known in the classifier training and even feature design stage. However, the steganalysis in the real world is done with different levels...
Persistent link: https://www.econbiz.de/10012043919
Saved in:
Cover Image
Squint Pixel Steganography: A Novel Approach to Detect Digital Crimes and Recovery of Medical Images
Ch., Rupa - In: International Journal of Digital Crime and Forensics (IJDCF) 8 (2016) 4, pp. 37-47
a major handicap while transferring medical images. In order to circumvent these issues used Steganography to hide the … medical image steganography technique to avoid distortion by an attacker. In this method, Original medical image itself acts …
Persistent link: https://www.econbiz.de/10012043933
Saved in:
  • 1
  • 2
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...