Academic literature on the topic 'Digital stenography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital stenography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Digital stenography"

1

Andersdotter, Karolina, and Malin Nauwerck. "Secretaries at Work." Digital Humanities in the Nordic and Baltic Countries Publications 4, no. 1 (2022): 9–22. http://dx.doi.org/10.5617/dhnbpub.11271.

Full text
Abstract:
The digitisation of cultural heritage collections has made large parts of our digital heritage available online. However, the collections have often been difficult to access in a meaningful way, still requiring item by item handling of digital images of text to decipher manuscripts and printed materials due to e.g. limited OCR (optical character recognition)/HTR (handwritten text recognition) capabilities or insufficient metadata. While these technologies are under rapid development, in some cases they require training data to learn both machine and handwritten texts, and in some cases it just
APA, Harvard, Vancouver, ISO, and other styles
2

Sackey, Abraham Kwaku. "Steganography Based On Random Pixel Selection for Efficient Data Hiding." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (2022): 113–20. http://dx.doi.org/10.22624/aims/digital/v10n4p12.

Full text
Abstract:
Advancement in technology has brought about the need for improvement in how data is stored and shared to prevent unauthorized access by third parties. Various methods including cryptography, watermarking, steganography and many others have been used in the quest to promote data safety. Currently, steganography has shown promise the most is being deployed by many. It simply involves hiding data in a media file but great success in data hiding has been chalked by this means. This paper explores the idea of steganography and its various types as well as how random pixel selection can be used to e
APA, Harvard, Vancouver, ISO, and other styles
3

Kwaku, Timothy. "Steganalysis Method for LSB Replacement Based On Local Gradient of Image Histogram." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (2022): 1–8. http://dx.doi.org/10.22624/aims/digital/v10n4p1.

Full text
Abstract:
Today's encryption and decryption processes rely heavily on the use of modern stenography techniques, which ultimately lead to steganalysis. Because of its enormous benefits, such as the protection of information or the transport of data, steganalysis is increasingly becoming an interesting research topic. This investigation is primarily concerned with steganalysis techniques, more specifically those that are utilized on photographic images. In this research, the many LSB steganalysis processes that are supported by previous research are investigated further, along with the outcomes of those o
APA, Harvard, Vancouver, ISO, and other styles
4

De Silva, Pavani Yashodha, and Gamage Upeksha Ganegoda. "New Trends of Digital Data Storage in DNA." BioMed Research International 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/8072463.

Full text
Abstract:
With the exponential growth in the capacity of information generated and the emerging need for data to be stored for prolonged period of time, there emerges a need for a storage medium with high capacity, high storage density, and possibility to withstand extreme environmental conditions. DNA emerges as the prospective medium for data storage with its striking features. Diverse encoding models for reading and writing data onto DNA, codes for encrypting data which addresses issues of error generation, and approaches for developing codons and storage styles have been developed over the recent pa
APA, Harvard, Vancouver, ISO, and other styles
5

A. Al Smadi, Takialddin, and Mohammed Maitah. "An Efficiency and Algorithm Detection for Stenography in Digital Symbols." International Journal of Computer Network and Information Security 6, no. 1 (2013): 34–38. http://dx.doi.org/10.5815/ijcnis.2014.01.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Swati. M, Miss Mugale. "Survey Paper on Secret Sharing Schema for Digital Quick Response Code Applications." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 3107–9. http://dx.doi.org/10.22214/ijraset.2021.37023.

Full text
Abstract:
Due to data loss rate during communication may be high and vary from time to time. Now a days, there is the possibility to hack and change your data while you are sending from one place to another. To solve this Problem , Many Approaches are proposed to provide security to Original Message. In this paper, We Provide a survey of different Approaches used for Secure Data transmission Like VSS Scheme, Visual Cryptography, Watermarking, Stenography, etc.
APA, Harvard, Vancouver, ISO, and other styles
7

Dai, Guo Yong, and Lu Yi Chen. "Data Hiding in Digital Image Based on Color Difference." Advanced Materials Research 760-762 (September 2013): 1547–51. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.1547.

Full text
Abstract:
Data hiding is one of the most important ways to achieve secure data transfer. Most spatial data hiding methods will make the host image distortion and the embedded data can be detected by stenography analysis. A novel data hiding method is proposed in this paper. This method first disturbs the raw critical data, and then embedded them only into areas of color changes much in the host image. Experiments show that this method can reduce the distortion of the host image and decrease the appreciability of the embedded data.
APA, Harvard, Vancouver, ISO, and other styles
8

Köhler, Mirko, Ivica Lukić, and Višnja Križanović Čik. "Protecting Information with Subcodstanography." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/9130683.

Full text
Abstract:
In modern communication systems, one of the most challenging tasks involves the implementation of adequate methods for successful and secure transfer of confidential digital information over an unsecured communication channel. Many encryption algorithms have been developed for protection of confidential information. However, over time, flaws have been discovered even with the most sophisticated encryption algorithms. Each encryption algorithm can be decrypted within sufficient time and with sufficient resources. The possibility of decryption has increased with the development of computer techn
APA, Harvard, Vancouver, ISO, and other styles
9

Susan B. Barnes. "Closed Captioning: Subtitling, Stenography, and the Digital Convergence of Text with Television (review)." Technology and Culture 50, no. 2 (2009): 469–71. http://dx.doi.org/10.1353/tech.0.0271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sukhdeep, kaur* Karandeep singh. "STEGANOGRAPHY SYSTEM FOR HIDING TEXT INTO AUDIO SIGNAL USING I-LSB TECHNIQUE & COMPRESSION ALGORITHM (LZW & ADAPTIVE HUFFMAN)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 786–91. https://doi.org/10.5281/zenodo.221013.

Full text
Abstract:
Steganography is technique to hide the secret data within a cover media such as digital images, sound files, video files in such a way that the existence of the message remains same. Audio stenography technique hides the secret data such as text or images in the audio signals. In this paper we proposed a technique for hiding the text message into audio signals using Improved LSB technique. In the proposed system the combination of Adaptive Huffman and LZW algorithm is used to compress the text message. Various test cases are performed on various inputs and results of the proposed system are ev
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Digital stenography"

1

Шеверда, О. Р. "Фотографічний твір як об’єкт авторського права". Thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/66835.

Full text
Abstract:
На сьогоднішній день фотографію можна вважати одним із найактуальніших способів відображення реальності. Однією з переваг є легковідтворюваність, але вона є й недоліком. Оскільки їх можна передавати в електронному форматі без перешкод, що сприяє незаконному відтворенню фотографій.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Digital stenography"

1

Downey, Gregory J. Closed Captioning: Subtitling, Stenography, and the Digital Convergence of Text with Television. Johns Hopkins University Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Closed Captioning: Subtitling, Stenography, and the Digital Convergence of Text with Television (Johns Hopkins Studies in the History of Technology). The Johns Hopkins University Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Digital stenography"

1

Trivedi, Naresh Kumar, Suresh Kumar, and Shikha Maheshwari. "Principles of Digital Watermarking." In Advances in Computer and Electrical Engineering. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2772-6.ch017.

Full text
Abstract:
This chapter introduces the benefits of watermark over cryptography and stenography. It provides the digital ownership on a file, but the noise is also attached with the file. Even if somebody copies the file and claims ownership, watermark still provides security. Watermarking is a robust and secured technique compared to other techniques. Implementation cost of this technique is optimized. This chapter also elucidates the attacks on watermarks and solutions to handle these attacks. Authors suggest watermarking will remain unchanged even if the file is compressed.
APA, Harvard, Vancouver, ISO, and other styles
2

Angulakshmi, M., and M. Deepa. "Image Stenography Using Deep Learning Techniques." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-2223-9.ch003.

Full text
Abstract:
The process of securely, imperceptibly, and recoverably embedding information under a cover image is known as digital image steganography. The application of deep convolutional neural networks (CNNs) to digital image steganography is investigated in this study. The preparation, concealment, and extraction stages of the steganography process were carried out using a two-dimensional CNN. However, the research's technique applied CNN's structure and employed a gain function based on multiple image similarity criteria to increase the imperceptibility of a cover picture and stenographic image. Seve
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Digital stenography"

1

Huang, He, Yinghui Xue, Linna Fan, and Mo Li. "The Development and New Direction of Digital Image Stenography." In 2020 International Conference on Robots & Intelligent System (ICRIS). IEEE, 2020. http://dx.doi.org/10.1109/icris52159.2020.00039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yigit, Yildiray, and Murat Karabatak. "A Stenography Application for Hiding Student Information into an Image." In 2019 7th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2019. http://dx.doi.org/10.1109/isdfs.2019.8757516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!