Academic literature on the topic 'Digital stenography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Digital stenography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Digital stenography"

1

De Silva, Pavani Yashodha, and Gamage Upeksha Ganegoda. "New Trends of Digital Data Storage in DNA." BioMed Research International 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/8072463.

Full text
Abstract:
With the exponential growth in the capacity of information generated and the emerging need for data to be stored for prolonged period of time, there emerges a need for a storage medium with high capacity, high storage density, and possibility to withstand extreme environmental conditions. DNA emerges as the prospective medium for data storage with its striking features. Diverse encoding models for reading and writing data onto DNA, codes for encrypting data which addresses issues of error generation, and approaches for developing codons and storage styles have been developed over the recent past. DNA has been identified as a potential medium for secret writing, which achieves the way towards DNA cryptography and stenography. DNA utilized as an organic memory device along with big data storage and analytics in DNA has paved the way towards DNA computing for solving computational problems. This paper critically analyzes the various methods used for encoding and encrypting data onto DNA while identifying the advantages and capability of every scheme to overcome the drawbacks identified priorly. Cryptography and stenography techniques have been analyzed in a critical approach while identifying the limitations of each method. This paper also identifies the advantages and limitations of DNA as a memory device and memory applications.
APA, Harvard, Vancouver, ISO, and other styles
2

A. Al Smadi, Takialddin, and Mohammed Maitah. "An Efficiency and Algorithm Detection for Stenography in Digital Symbols." International Journal of Computer Network and Information Security 6, no. 1 (2013): 34–38. http://dx.doi.org/10.5815/ijcnis.2014.01.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dai, Guo Yong, and Lu Yi Chen. "Data Hiding in Digital Image Based on Color Difference." Advanced Materials Research 760-762 (September 2013): 1547–51. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.1547.

Full text
Abstract:
Data hiding is one of the most important ways to achieve secure data transfer. Most spatial data hiding methods will make the host image distortion and the embedded data can be detected by stenography analysis. A novel data hiding method is proposed in this paper. This method first disturbs the raw critical data, and then embedded them only into areas of color changes much in the host image. Experiments show that this method can reduce the distortion of the host image and decrease the appreciability of the embedded data.
APA, Harvard, Vancouver, ISO, and other styles
4

Swati. M, Miss Mugale. "Survey Paper on Secret Sharing Schema for Digital Quick Response Code Applications." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 3107–9. http://dx.doi.org/10.22214/ijraset.2021.37023.

Full text
Abstract:
Due to data loss rate during communication may be high and vary from time to time. Now a days, there is the possibility to hack and change your data while you are sending from one place to another. To solve this Problem , Many Approaches are proposed to provide security to Original Message. In this paper, We Provide a survey of different Approaches used for Secure Data transmission Like VSS Scheme, Visual Cryptography, Watermarking, Stenography, etc.
APA, Harvard, Vancouver, ISO, and other styles
5

Köhler, Mirko, Ivica Lukić, and Višnja Križanović Čik. "Protecting Information with Subcodstanography." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/9130683.

Full text
Abstract:
In modern communication systems, one of the most challenging tasks involves the implementation of adequate methods for successful and secure transfer of confidential digital information over an unsecured communication channel. Many encryption algorithms have been developed for protection of confidential information. However, over time, flaws have been discovered even with the most sophisticated encryption algorithms. Each encryption algorithm can be decrypted within sufficient time and with sufficient resources. The possibility of decryption has increased with the development of computer technology since available computer speeds enable the decryption process based on the exhaustive data search. This has led to the development of steganography, a science which attempts to hide the very existence of confidential information. However, the stenography also has its disadvantages, listed in the paper. Hence, a new method which combines the favourable properties of cryptography based on substitution encryption and stenography is analysed in the paper. The ability of hiding the existence of confidential information comes from steganography and its encryption using a coding table makes its content undecipherable. This synergy greatly improves protection of confidential information.
APA, Harvard, Vancouver, ISO, and other styles
6

Susan B. Barnes. "Closed Captioning: Subtitling, Stenography, and the Digital Convergence of Text with Television (review)." Technology and Culture 50, no. 2 (2009): 469–71. http://dx.doi.org/10.1353/tech.0.0271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Inan, Yucel. "Assesment of the Image Distortion in Using Various Bit Lengths of Steganographic LSB." ITM Web of Conferences 22 (2018): 01026. http://dx.doi.org/10.1051/itmconf/20182201026.

Full text
Abstract:
Several methods developed and applied for protecting the information. One of these is the stenography. Steganographic techniques are used to transmit the information in the image to the receiver in a secure manner. There are two main principles in the steganographic process. The first one is to hide the message in the image and the second one is to reduce the distortion on the image caused by information hiding. By making changes on digital images, a lot of information can be placed in the image. Nevertheless, changes in the image should not be noticed. In this paper, the effect of using various bit length of the steganographic LSB method on the image distortion is studied. The PSNR, SNR and MSE were used to assess the distortion rates of the images. Histograms were drawn to visualize the differences between original and encoded, “stego-images”.
APA, Harvard, Vancouver, ISO, and other styles
8

Kulkarni, Utkarsha, Rosemeen Mansuri, and Riya Adikane. "File Storage on Cloud Using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 1950–53. http://dx.doi.org/10.22214/ijraset.2022.42652.

Full text
Abstract:
Abstract: Hybrid cryptography is implemented to provide the multilevel of encryption and decryption at both sender and receiver side which increase the security of the cloud storage. This security model gives the transparency to the cloud user. The hybrid encryption algorithm combines the advantages of fast encryption speed of AES algorithm, easy management of RSA algorithm key, and digital signature to ensure the secure transmission of confidential documents. Data/information is the most valuable asset for the modern electronic communication system. Securing data or information has become a challenge in this competitive world. There are many techniques for securing data/information such as cryptography, stenography etc. In this paper, hybrid cryptography has been applied using AES and RSA.AES and RSA algorithms are implemented to provide the multilevel of encryption and decryption at both sender and receiver side which increase the security of the cloud storage. This approach provides transparency to the cloud user as wellas cloud service provider in order to reduce the security threats. The proposed model is implemented in C and .NET. Data security is increased up to a maximum extent and it takes less time in uploading and downloading the text file as compare to existing system. [1] Index Terms: Hybrid, Symmetric, Asymmetric, Cloud, Cryptog-raphy.
APA, Harvard, Vancouver, ISO, and other styles
9

Zelenkauskaite, Asta. "Closed Captioning: Subtitling, Stenography, and the Digital Convergence of Text with Television, by Gregory J. Downey. Baltimore, MD: Johns Hopkins University Press, 2008. 400 pp. $52.00 (cloth). ISBN 978-0801887109." Information Society 26, no. 3 (2010): 241–42. http://dx.doi.org/10.1080/01972241003712314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Silberstein-Loeb, Jonathan. "Closed Captioning: Subtitling, Stenography, and the Digital Convergence of Text with Television. By Greg J. Downey. Baltimore: Johns Hopkins University Press, 2008. ix + 387 pp. Illustrations, figures, maps, notes, index. Cloth, $52.00. ISBN: 978-0-801-88710-9." Business History Review 83, no. 1 (2009): 199–201. http://dx.doi.org/10.1017/s0007680500000349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Digital stenography"

1

Шеверда, О. Р. "Фотографічний твір як об’єкт авторського права". Thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/66835.

Full text
Abstract:
На сьогоднішній день фотографію можна вважати одним із найактуальніших способів відображення реальності. Однією з переваг є легковідтворюваність, але вона є й недоліком. Оскільки їх можна передавати в електронному форматі без перешкод, що сприяє незаконному відтворенню фотографій.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Digital stenography"

1

Closed Captioning: Subtitling, Stenography, and the Digital Convergence of Text with Television (Johns Hopkins Studies in the History of Technology). The Johns Hopkins University Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Digital stenography"

1

Trivedi, Naresh Kumar, Suresh Kumar, and Shikha Maheshwari. "Principles of Digital Watermarking." In Advances in Computer and Electrical Engineering. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2772-6.ch017.

Full text
Abstract:
This chapter introduces the benefits of watermark over cryptography and stenography. It provides the digital ownership on a file, but the noise is also attached with the file. Even if somebody copies the file and claims ownership, watermark still provides security. Watermarking is a robust and secured technique compared to other techniques. Implementation cost of this technique is optimized. This chapter also elucidates the attacks on watermarks and solutions to handle these attacks. Authors suggest watermarking will remain unchanged even if the file is compressed.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Digital stenography"

1

Huang, He, Yinghui Xue, Linna Fan, and Mo Li. "The Development and New Direction of Digital Image Stenography." In 2020 International Conference on Robots & Intelligent System (ICRIS). IEEE, 2020. http://dx.doi.org/10.1109/icris52159.2020.00039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yigit, Yildiray, and Murat Karabatak. "A Stenography Application for Hiding Student Information into an Image." In 2019 7th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2019. http://dx.doi.org/10.1109/isdfs.2019.8757516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography