Applied public-key steganography (original) (raw)

Network based Steganography

Nitin Malik

International Journal of Computer Applications, 2013

View PDFchevron_right

Digital Steganography—An Introduction to Techniques and Tools

Merrill Warkentin

Communications of the Association for Information Systems

View PDFchevron_right

A Survey on Image Steganography Techniques

Kashyap Pandya

International Journal of Computer Applications, 2014

View PDFchevron_right

Review Of Different Techniques Used In Recent Steganography Researches

Juned Mazumder

2012

View PDFchevron_right

Steganoflage" -A Novel Approach to Image Steganography

Joan Condell

View PDFchevron_right

Data Security Using Cryptography and Steganography Techniques

Fatma Omara

International Journal of Advanced Computer Science and Applications, 2016

View PDFchevron_right

A Comparative Analysis of Image Steganography

Deepika Chowdavarapu

International Journal of Computer Applications, 2010

View PDFchevron_right

Proposed LSB4 of Data Steganography

Ziad Alqadi

International journal of computer science and mobile computing, 2024

View PDFchevron_right

Secure data transmission using steganography based data hiding in TCP/IP

Mahesh Goudar

Proceedings of the International Conference & Workshop on Emerging Trends in Technology - ICWET '11, 2011

View PDFchevron_right

Hybridization of Visual Cryptography and Image Realization Steganography

Pooja Rai

International Journal of Advanced Science and Technology, 2020

View PDFchevron_right

Steganography using a 3-player game

Frédéric Comby

Journal of Visual Communication and Image Representation

View PDFchevron_right

Digital Colour Image Steganography for PNG Format and Secured Based on Encoding and Clustering

Mohammad Sharif Mohammadi

International Journal of Engineering Research and Technology, 2020

View PDFchevron_right

JPEG Image Steganography based on Coefficients Selection and Partition

Mohammad Sharif Mohammadi

International Journal of Image, Graphics and Signal Processing, 2017

View PDFchevron_right

Steganography capacity: A steganalysis perspective

hardik patel

SPIE Security and Watermarking of …, 2003

View PDFchevron_right

Image Steganography: Learn How to Hide Data in Images

Dr. Sudhir Shelke

International Research Journal Of Modernization In Engineering Technology And Science, 2024

View PDFchevron_right

Security System for Data Using Steganography and Cryptography (SSDSC)

khalil abu haltam

Computer Science & Information Technology ( CS & IT ), 2016

View PDFchevron_right

Reconstruction of Printed Document using Text Based Steganography

Hitesh Singh

iiis.org

View PDFchevron_right

A Modified Image Steganography Method based on LSB Technique

Fatma Omara

International journal of computer applications, 2015

View PDFchevron_right

Image Steganography using Karhunen-Loève Transform and Least Bit Substitution

Rakshak Sood

International Journal of Computer Applications, 2013

View PDFchevron_right

Secure Audio Steganography for Hiding Secret information

Dr. K SAKTHISUDHAN Ph.D

IJCA Proceedings on …, 2012

View PDFchevron_right

Lifting the Veil in Interest

Istvan Abel

Social Science Research Network, 2019

View PDFchevron_right

A Comparative Study of Recent Steganography Techniques for Multiple Image Formats

Mohammad Sharif Mohammadi

International Journal of Computer Network and Information Security, 2019

View PDFchevron_right

STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost

Christophe Guyeux

annals of telecommunications - annales des télécommunications, 2015

View PDFchevron_right

Implementation of Audio Image Steganography—A Technique to Secure Data

sumit agrahari

2021

View PDFchevron_right

From the Private to the Concealed

Rodrigo Bentes Monteiro

2011

View PDFchevron_right