22   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Saurabh Agarwal and Ki-Hyun Jung    
Digital images are very popular and commonly used for hiding crucial data. In a few instances, image steganography is misused for communicating with improper data. In this paper, a robust deep neural network is proposed for the identification of content-... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jun Park and Youngho Cho    
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Omar Younis Abdulhammed     Pág. 28 - 36
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

 
en línea
Habiba Sultana, A. H. M. Kamal, Gahangir Hossain and Muhammad Ashad Kabir    
In digital image processing and steganography, images are often described using edges and local binary pattern (LBP) codes. By combining these two properties, a novel hybrid image steganography method of secret embedding is proposed in this paper. This m... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Saad Said Alqahtany, Ahmad B. Alkhodre, Abdulwahid Al Abdulwahid and Manar Alohaly    
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored. Text-based steganography has the advantage of a low bandwidth overhead, ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ibrahim Abunadi, Hanan Abdullah Mengash, Saud S. Alotaibi, Mashael M. Asiri, Manar Ahmed Hamza, Abu Sarwar Zamani, Abdelwahed Motwakel and Ishfaq Yaseen    
Recent developments of semiconductor and communication technologies have resulted in the interconnection of numerous devices in offering seamless communication and services, which is termed as Internet of Everything (IoE). It is a subset of Internet of T... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Urmila Pilania, Rohit Tanwar, Mazdak Zamani and Azizah Abdul Manaf    
In today?s world of computers everyone is communicating their personal information through the web. So, the security of personal information is the main concern from the research point of view. Steganography can be used for the security purpose of person... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Amine Khaldi     Pág. 143 - 149
In this work, we present a classification of steganographic methods applicable to digital images. We also propose a classification of steganographic methods according to the type of image used. We noticed there are no methods that can be applied to all i... ver más
Revista: International Annals of Science    Formato: Electrónico

 
en línea
Marcin Lawnik, Artur Pelka and Adrian Kapczynski    
In the era of ubiquitous digitization, the Internet of Things (IoT), information plays a vital role. All types of data are collected, and some of this data are stored as text files. An important aspect?regardless of the type of data?is related to file st... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Piotr Artiemjew and Aleksandra Kislak-Malinowska    
Our concern in this paper is to explore the possibility of using rough inclusions for image steganography. We present our initial research using indiscernibility relation as a steganographic key for hiding information into the stego carrier by means of a... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Jaewoo Jeon and Youngho Cho    
Once a botnet is constructed over the network, a bot master and bots start communicating by periodically exchanging messages, which is known as botnet C&C communication, in order to send botnet commands to bots, collect critical information stored in... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Ladeh S. Abdulraman, Sheerko R. Hma Salah, Halgurd S. Maghdid, Azhin T. Sabir     Pág. 1 - 7
Steganography is a way to convey secret communication, with rapid electronic communication and high demand of using the internet, steganography has become a wide field of research and discussion. In this paper a new approach for hiding information in cov... ver más
Revista: Innovaciencia    Formato: Electrónico

 
en línea
Devi Ratnasari, Adam Sekti Aji     Pág. 59 - 65

 
en línea
Rasber Dh. Rashid, Ladeh S. Abdulrahman, Taban F. Majeed     Pág. 1 - 12
Digital Steganography means hiding sensitive data inside a cover object in a way that is invisible to un-authorized persons. Many proposed steganography techniques in spatial domain may achieve high invisibility requirement but sacrifice the good robustn... ver más
Revista: Innovaciencia    Formato: Electrónico

 
en línea
Pin Wu, Yang Yang and Xiaoqiang Li    
Traditional image steganography often leans interests towards safely embedding hidden information into cover images with payload capacity almost neglected. This paper combines recent deep convolutional neural network methods with image-into-image stegano... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Pin Wu, Yang Yang and Xiaoqiang Li    
Traditional image steganography often leans interests towards safely embedding hidden information into cover images with payload capacity almost neglected. This paper combines recent deep convolutional neural network methods with image-into-image stegano... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Muhaimin Hasanudin,Deni Kuswoyo,Boy Yuliadi     Pág. 153 - 160
This study uses the technique of incognito data and information into a container in the form of images combined with the addition of the password by using the method of Least Significant Bit (LSB) and the method of Haar Wavelet. Testing the system by sen... ver más
Revista: Aceh International Journal of Science and Technology    Formato: Electrónico

 
en línea
Pin Wu, Xuting Chang, Yang Yang and Xiaoqiang Li    
Secret information sharing through image carriers has aroused much research attention in recent years with images? growing domination on the Internet and mobile applications. The technique of embedding secret information in images without being detected ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Lin Huo, Ruipei Chen, Jie Wei and Lang Huang    
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hala A. Naman,Naseer Ali Hussien,Mohand Lokman Al-dabag,Haider Th.Salim Alrikabi     Pág. pp. 172 - 183
One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion ... ver más

« Anterior     Página: 1 de 2     Siguiente »