Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Steganography"

ADD TO MY LIST
 
Implementation of LSB Steganography and its Evaluation for Various File Formats

Author(s): V. Lokeswara Reddy | Dr. A. Subramanyam | Dr.P. Chenna Reddy
A Learning-Based Steganalytic Method against LSB Matching Steganography

Author(s): Z. Xia | L. Yang | X. Sun | W. Liang | D. Sun | Z. Ruan
Stego System on Chip with LFSR based Information Hiding Approach

Author(s): R. Sundararaman | Har Narayan Upadhyay
A Robust and Secure Methodology for Network Communications

Author(s): Mayank Srivastava | Mohd. Qasim Rafiq | Rajesh Kumar Tiwari
Secure Transmission of Compound Information Using Image Steganography

Author(s): Lalitha.G, | Ashish Jain, | U. Raja
Hybrid Domain in LSB Steganography

Author(s): K B Shiva Kumar | K B Raja | Sabyasachi Pattnaik
Steganography Based on Payload Transformation

Author(s): K B Shiva Kumar | K B Raja | R K Chhotaray | Sabyasachi Pattnaik
Evidence based Access Control over Web Services using Multi Security

Author(s): E. S. Shameem Sulthana | S. Kanmani
EMBEDDING INFORMATION IN DCT COEFFICIENTS BASED ON AVERAGE COVARIANCE

Author(s): N SATHISHA, | K SURESH BABU, | K B RAJA, | VENUGOPAL K R, | L M Patnaik
A NEW METHOD FOR EMBEDDING DATA WITHIN AN IMAGE

Author(s): Samir Kumar Bandyopadhyay
IMAGE STEGANOGRAPHY BASED ON POLYNOMIAL FUNCTIONS

Author(s): Ms.Soniya Vijayakumar
Cryptography and Steganography-A Survey

Author(s): A. Joseph Raphael | Dr. V. Sundaram
A Randomized Secure Data Hiding Algorithm Using File Hybridization for Information Security

Author(s): K. Venkata Ramana, | Dr.B.Raveendra Babu, | Sri Ch.Ratna Babu
Applying and Analyzing Security using Images : Steganography v.s. Steganalysis

Author(s): Nighat Mir | Asrar Qadi | Wissal Dandachi
An Optimized Method for Concealing Data using Audio Steganography

Author(s): Md. Shafakhatullah Khan | V.Vijaya Bhasker | V. Shiva Nagaraju
A Novel Approach of Color Image Hiding using RGB Color planes and DWT

Author(s): Nilanjan Dey | Anamitra Bardhan Roy | Sayantan Dey
STEGANALYSIS USING COLOUR MODEL CONVERSION

Author(s): P.Thiyagarajan | G.Aghila | V. Prasanna Venkatesan
Non-Specialized File Format Extension

Author(s): Blake W. Ford & Khosrow Kaikhah
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and Huffman Encoding

Author(s): P.Nithyanandam, T.Ravichandran, N.M.Santron, E. Priyadharshini
JPEG Steganography System with Minimal Changes to the Quantized DCT Coefficients

Author(s): Hamdy A. Morsy | Zaki B. Nossair | Alaa M. Hamdy | Fathy Z. Amer
Protection through Oblivion 'An Image Based Steganography'

Author(s): T Chandra Sekhara Reddy | D Prasad | B.Venkateswara Reddy
Hardware Architecture for a Message Hiding Algorithm with Novel Randomizers

Author(s): Saeed Mahmoudpour | Sattar Mirzakuchaki
High Security Image Steganography with Modified Arnold's Cat Map

Author(s): Minati Mishra | Ashanta Ranjan Routray | Sunit Kumar
Efficient & Secure Data Hiding Using Secret Reference Matrix

Author(s): Laxman Tawade | Rajshree Mahajan | Chandan Kulthe
An Efficient Method of Steganography using Matrix Approach

Author(s): Nirmalya Chowdhury | Puspita Manna
Random Image Steganography and Steganalysis: Present Status and Future Directions

Author(s): Rengarajan Amirtharajan | Jiaohua Qin | John Bosco Balaguru Rayappan
Inverted Pattern in Inverted Time Domain for Icon Steganography

Author(s): Rengarajan Amirtharajan | John Bosco Balaguru Rayappan
Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA

Author(s): Sundararaman Rajagopalan | Rengarajan Amirtharajan | Har Narayan Upadhyay | John Bosco Balaguru Rayappan
A Hybrid Approach for Security Enhancement by Compressed Crypto-Stegno Scheme

Author(s): G. Manikandan | N. Sairam | M. Kamarasan
Data Hiding in JPEG Images

Author(s): S. K. Muttoo | Sushil Kumar
Data Compression of Fingerprint Minutiae

Author(s): VISHAL SHRIVASTAVA | SUMIT SHARMA
Audio Steganography Coding Using the Discrete Wavelet Transforms

Author(s): Siwar Rekik | Driss Guerchi | Habib Hamam | Sid-Ahmed Selouani
Text Realization Image Steganography

Author(s): Dr. Mohammed Nasser Hussein Al-Turfi
Image Stenography Skin Tone Detection

Author(s): DEEPALI BHAMARE | VIKAS GUPTA | P.B.SALUNKHE
High Capacity and Resistance to Additive Noise Audio Steganography Algorithm

Author(s): Haider Ismael Shahadi | Razali Bin Jidin
Experimenting with the Novel Approaches in Text Steganography

Author(s): Shraddha Dulera | Devesh Jinwala | Aroop Dasgupta
Audio Wave Steganography

Author(s): Ajay.B.Gadicha
Steganography using Stochastic Diffusion for the Covert Communication of Digital Images

Author(s): Jonathan M Blackledge | AbdulRahman I Al-Rawi
Pixel Forefinger for Gray in Color: A Layer by Layer Stego

Author(s): Siva Janakiraman | Rengarajan Amirtharajan | K. Thenmozhi | John Bosco Balaguru Rayappan
Secure Steganography in Multimedia Content

Author(s): Goljan Miroslav | Westfeld Andreas
Reliable Steganalysis Using a Minimum Set of Samples and Features

Author(s): Miche Yoan | Bas Patrick | Lendasse Amaury | Jutten Christian | Simula Olli
Video Error Correction Using Steganography

Author(s): Robie David L | Mersereau Russell M
The First 50 Years of Electronic Watermarking

Author(s): Cox Ingemar J | Miller Matt L
Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm

Author(s): Yu Lifang | Zhao Yao | Ni Rongrong | Li Ting
Watermarking Algorithms for 3D NURBS Graphic Data

Author(s): Lee Jae Jun | Cho Nam Ik | Lee Sang Uk
Image Steganalysis with Binary Similarity Measures

Author(s): Avcıbaş İsmail | Kharrazi Mehdi | Memon Nasir | Sankur Bülent
Review on Binary Image Steganography and Watermarking

Author(s): Mrs. Gyankamal J. Chhaje | Ms. Krupali V. Deshmukh | Ms. Trupti S. Kulkarni
A Novel Audio Steganography Technique by M16MA

Author(s): Souvik Bhattacharyya | Arko Kundu | Gautam Sanyal
Extended Encoding of Telugu Text for Hiding Compatibility

Author(s): Lakshmeeswari G | Rajya Lakshmi D | Lalitha Bhaskari D
Design and Implementation of an Electronic Identification Card

Author(s): J. Flores‐Escalante | J. Pérez‐Díaz | R. Gómez‐Cárdenas
Enhancing Confidentiality of Private Communication through Dual Compression

Author(s): Kristipati Sudharshana Reddy | Munwar Sk | Rajesh Bhakthavatsalam
A New Image Steganography Based on Decimal-Digits Representation

Author(s): Mohammed Abbas Fadhil Al-Husainy
Optimum segment length for embedding in the LSB of JPEG images with Minimum MSE

Author(s): Hamdy A. Morsy | Zaki B. Nossair | Alaa M. Hamdy | Fathy Z. Amer
Ensuring the security and privacy of information in mobile health-care communication systems

Author(s): Ademola O. Adesina | Kehinde K. Agbele | Ronald Februarie | Ademola P. Abidoye | Henry O. Nyongesa
Guest Editorial

Author(s): Neeraj Kumar Nehra | Pranay Chaudhuri
JPEG Compression Steganography & Crypography Using Image-Adaptation Technique

Author(s): Meenu Kumari | A. Khare | Pallavi Khare
Analysis and Study of Embedded Capability to HSBH by SPA

Author(s): Yuanzhi Wang | Liwei Chen | Fei Zhang | Shanhe Jiang | Lijuan Sun
Text Steganography System Using Markov Chain Source Model and DES Algorithm

Author(s): Weihui Dai | Yue Yu | Yonghui Dai | Bin Deng
A Simple Image Encoding Method with Data Lossless Information Hiding

Author(s): Zhi-Hui Wang | Chin-Chen Chang | Ming-Chu Li | Tzu-Chuen Lu
A Blind Steganalytic Scheme Based on DCT and Spatial Domain for JPEG Images

Author(s): Zhuo Li | Kuijun Lu | Xianting Zeng | Xuezeng Pan
Guest Editorial

Author(s): Jean-Henry Morin | Shiguo Lian | Xin Wang | David Llewellyn-Jones
Improved LSB-matching Steganography for Preserving Second-order Statistics

Author(s): Guangjie Liu | Zhan Zhang | Yuewei Dai | Shiguo Lian
Stego on 2n:1 Platform for Users and Embedding

Author(s): M. Padmaa | Y. Venkataramani | Rengarajan Amirtharajan
A Huffman Coding Section-based Steganography for AAC Audio

Author(s): Jie Zhu | Rang-Ding Wang | Juan Li | Di-Qun Yan
A ROBUST STEGANOGRAPHY MODEL USING WAVELET-BASED BLOCK-PARTITION MODIFICATION

Author(s): Sherin Youssef | Ahmed Abu Elfarag | Reta Raouf
A Novel Approach for Image Steganography in Spatial Domain Using Last Two Bits of Pixel Value

Author(s): A Novel Approach for Image Steganography in Spatial Domain Using Last Two Bits of Pixel Value
INFORMATION HIDING USING AUDIO STEGANOGRAPHY – A SURVEY

Author(s): Jayaram P | Ranganatha H R | Anupama H S
Segmenting and Hiding Data Randomly Based on Index Channel

Author(s): Emad T Khalaf | Norrozila Sulaiman
A Hybrid Method for Color Image Steganography in Spatial and Frequency Domain

Author(s): Asghar Shahrzad Khashandarag | Akbar Shahrzad Khashandarag | Amin Rahimi Oskuei | Hamid Haji Agha Mohammadi | Mirkamal Mirnia
A Survey about the Latest Trends and Research Issues of Cryptographic Elements

Author(s): Ijaz Ali Shoukat | Kamalrulnizam Abu Bakar | Mohsin Iftikhar
Steganography based on Contourlet Transform

Author(s): Sushil Kumar | S.K. Muttoo
Performance Comparison of Robust Steganography Based on Multiple Transformation Techniques

Author(s): K B Shiva Kumar | K B Raja | R K Chhotaray | Sabyasachi Pattnaik
Cryptography and Steganography of Video Information in Modern Communications

Author(s): Zenon Hrytskiv | Sviatoslav Voloshynovskiy | Yuriy Rytsar
ContSteg: Contourlet-Based Steganography Method

Author(s): Hedieh SAJEDI | Mansour JAMZAD
Hiding data in DNA of living organisms

Author(s): Shu-Hong Jiao | Robert Goutte
Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Author(s): Debnath BHATTACHARYYA | Jhuma DUTTA | Poulami DAS | Samir Kumar BANDYOPADHYAY | Tai-hoon KIM
Message Guided Adaptive Random Steganography using Countingout Embedding

Author(s): Ravuru Rakesh | Shantan Devathi | Prashanth Sekhar Chandra Sekaran | Bala Surendra Kumar Tatikonda
COMPARISON AND ANALYSIS OF WATERMARKING ALGORITHMS IN COLOR IMAGES – IMAGE SECURITY PARADIGM

Author(s): D. Biswas | S. Biswas | P.P. Sarkar | D. Sarkar | S. Banerjee | A. Pal
Data Hiding Within Audio Signals

Author(s): Rade Petrović | Joseph M. Winograd | Kanaan Jemili | Eric Metois
Detection of LSB Matching Steganography using Neighborhood Node Degree Characteristics

Author(s): Bin Xia | Xingming Sun | Lingyun Xiang | Haijun Luo | Hengfu Yang
Adaptive Randomization in Image Steganography Pertaining to Most Significant Nibble

Author(s): Ravuru Rakesh | Shantan Devathi | Prashanth Sekhar Chandra Sekaran | SiramSanath Kumar
Context Aware Healthcare Application

Author(s): Shankari Bhattacharyya | RA.K.Saravanagru | Arunkumar Thangavelu
A High Capacity Steganographic Technique based on LSB and PVD Modulus Methods

Author(s): Manjunath Gadiparthi | Keshav Sagar | Divya Sahukari | Rakesh Chowdary
Image based Secret Communication using Double Compression

Author(s): Chaitanya Kommini | Kamalesh Ellanti | Srinivasulu Asadi
Affiliate Program      Why do you need a reservation system?