Applied public-key steganography (original) (raw)
Related papers
International Journal of Computer Applications, 2013
Digital Steganography—An Introduction to Techniques and Tools
Communications of the Association for Information Systems
A Survey on Image Steganography Techniques
International Journal of Computer Applications, 2014
Review Of Different Techniques Used In Recent Steganography Researches
2012
Steganoflage" -A Novel Approach to Image Steganography
Data Security Using Cryptography and Steganography Techniques
International Journal of Advanced Computer Science and Applications, 2016
A Comparative Analysis of Image Steganography
International Journal of Computer Applications, 2010
Proposed LSB4 of Data Steganography
International journal of computer science and mobile computing, 2024
Secure data transmission using steganography based data hiding in TCP/IP
Proceedings of the International Conference & Workshop on Emerging Trends in Technology - ICWET '11, 2011
Hybridization of Visual Cryptography and Image Realization Steganography
International Journal of Advanced Science and Technology, 2020
Steganography using a 3-player game
Journal of Visual Communication and Image Representation
Digital Colour Image Steganography for PNG Format and Secured Based on Encoding and Clustering
International Journal of Engineering Research and Technology, 2020
JPEG Image Steganography based on Coefficients Selection and Partition
International Journal of Image, Graphics and Signal Processing, 2017
Steganography capacity: A steganalysis perspective
SPIE Security and Watermarking of …, 2003
Image Steganography: Learn How to Hide Data in Images
International Research Journal Of Modernization In Engineering Technology And Science, 2024
Security System for Data Using Steganography and Cryptography (SSDSC)
Computer Science & Information Technology ( CS & IT ), 2016
Reconstruction of Printed Document using Text Based Steganography
iiis.org
A Modified Image Steganography Method based on LSB Technique
International journal of computer applications, 2015
Image Steganography using Karhunen-Loève Transform and Least Bit Substitution
International Journal of Computer Applications, 2013
Secure Audio Steganography for Hiding Secret information
IJCA Proceedings on …, 2012
Social Science Research Network, 2019
A Comparative Study of Recent Steganography Techniques for Multiple Image Formats
International Journal of Computer Network and Information Security, 2019
STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost
annals of telecommunications - annales des télécommunications, 2015
Implementation of Audio Image Steganography—A Technique to Secure Data
2021
From the Private to the Concealed
2011