To see the other types of publications on this topic, follow the link: Digital stenography.

Journal articles on the topic 'Digital stenography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 37 journal articles for your research on the topic 'Digital stenography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Andersdotter, Karolina, and Malin Nauwerck. "Secretaries at Work." Digital Humanities in the Nordic and Baltic Countries Publications 4, no. 1 (2022): 9–22. http://dx.doi.org/10.5617/dhnbpub.11271.

Full text
Abstract:
The digitisation of cultural heritage collections has made large parts of our digital heritage available online. However, the collections have often been difficult to access in a meaningful way, still requiring item by item handling of digital images of text to decipher manuscripts and printed materials due to e.g. limited OCR (optical character recognition)/HTR (handwritten text recognition) capabilities or insufficient metadata. While these technologies are under rapid development, in some cases they require training data to learn both machine and handwritten texts, and in some cases it just
APA, Harvard, Vancouver, ISO, and other styles
2

Sackey, Abraham Kwaku. "Steganography Based On Random Pixel Selection for Efficient Data Hiding." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (2022): 113–20. http://dx.doi.org/10.22624/aims/digital/v10n4p12.

Full text
Abstract:
Advancement in technology has brought about the need for improvement in how data is stored and shared to prevent unauthorized access by third parties. Various methods including cryptography, watermarking, steganography and many others have been used in the quest to promote data safety. Currently, steganography has shown promise the most is being deployed by many. It simply involves hiding data in a media file but great success in data hiding has been chalked by this means. This paper explores the idea of steganography and its various types as well as how random pixel selection can be used to e
APA, Harvard, Vancouver, ISO, and other styles
3

Kwaku, Timothy. "Steganalysis Method for LSB Replacement Based On Local Gradient of Image Histogram." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (2022): 1–8. http://dx.doi.org/10.22624/aims/digital/v10n4p1.

Full text
Abstract:
Today's encryption and decryption processes rely heavily on the use of modern stenography techniques, which ultimately lead to steganalysis. Because of its enormous benefits, such as the protection of information or the transport of data, steganalysis is increasingly becoming an interesting research topic. This investigation is primarily concerned with steganalysis techniques, more specifically those that are utilized on photographic images. In this research, the many LSB steganalysis processes that are supported by previous research are investigated further, along with the outcomes of those o
APA, Harvard, Vancouver, ISO, and other styles
4

De Silva, Pavani Yashodha, and Gamage Upeksha Ganegoda. "New Trends of Digital Data Storage in DNA." BioMed Research International 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/8072463.

Full text
Abstract:
With the exponential growth in the capacity of information generated and the emerging need for data to be stored for prolonged period of time, there emerges a need for a storage medium with high capacity, high storage density, and possibility to withstand extreme environmental conditions. DNA emerges as the prospective medium for data storage with its striking features. Diverse encoding models for reading and writing data onto DNA, codes for encrypting data which addresses issues of error generation, and approaches for developing codons and storage styles have been developed over the recent pa
APA, Harvard, Vancouver, ISO, and other styles
5

A. Al Smadi, Takialddin, and Mohammed Maitah. "An Efficiency and Algorithm Detection for Stenography in Digital Symbols." International Journal of Computer Network and Information Security 6, no. 1 (2013): 34–38. http://dx.doi.org/10.5815/ijcnis.2014.01.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Swati. M, Miss Mugale. "Survey Paper on Secret Sharing Schema for Digital Quick Response Code Applications." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 3107–9. http://dx.doi.org/10.22214/ijraset.2021.37023.

Full text
Abstract:
Due to data loss rate during communication may be high and vary from time to time. Now a days, there is the possibility to hack and change your data while you are sending from one place to another. To solve this Problem , Many Approaches are proposed to provide security to Original Message. In this paper, We Provide a survey of different Approaches used for Secure Data transmission Like VSS Scheme, Visual Cryptography, Watermarking, Stenography, etc.
APA, Harvard, Vancouver, ISO, and other styles
7

Dai, Guo Yong, and Lu Yi Chen. "Data Hiding in Digital Image Based on Color Difference." Advanced Materials Research 760-762 (September 2013): 1547–51. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.1547.

Full text
Abstract:
Data hiding is one of the most important ways to achieve secure data transfer. Most spatial data hiding methods will make the host image distortion and the embedded data can be detected by stenography analysis. A novel data hiding method is proposed in this paper. This method first disturbs the raw critical data, and then embedded them only into areas of color changes much in the host image. Experiments show that this method can reduce the distortion of the host image and decrease the appreciability of the embedded data.
APA, Harvard, Vancouver, ISO, and other styles
8

Köhler, Mirko, Ivica Lukić, and Višnja Križanović Čik. "Protecting Information with Subcodstanography." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/9130683.

Full text
Abstract:
In modern communication systems, one of the most challenging tasks involves the implementation of adequate methods for successful and secure transfer of confidential digital information over an unsecured communication channel. Many encryption algorithms have been developed for protection of confidential information. However, over time, flaws have been discovered even with the most sophisticated encryption algorithms. Each encryption algorithm can be decrypted within sufficient time and with sufficient resources. The possibility of decryption has increased with the development of computer techn
APA, Harvard, Vancouver, ISO, and other styles
9

Susan B. Barnes. "Closed Captioning: Subtitling, Stenography, and the Digital Convergence of Text with Television (review)." Technology and Culture 50, no. 2 (2009): 469–71. http://dx.doi.org/10.1353/tech.0.0271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sukhdeep, kaur* Karandeep singh. "STEGANOGRAPHY SYSTEM FOR HIDING TEXT INTO AUDIO SIGNAL USING I-LSB TECHNIQUE & COMPRESSION ALGORITHM (LZW & ADAPTIVE HUFFMAN)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 786–91. https://doi.org/10.5281/zenodo.221013.

Full text
Abstract:
Steganography is technique to hide the secret data within a cover media such as digital images, sound files, video files in such a way that the existence of the message remains same. Audio stenography technique hides the secret data such as text or images in the audio signals. In this paper we proposed a technique for hiding the text message into audio signals using Improved LSB technique. In the proposed system the combination of Adaptive Huffman and LZW algorithm is used to compress the text message. Various test cases are performed on various inputs and results of the proposed system are ev
APA, Harvard, Vancouver, ISO, and other styles
11

Inan, Yucel. "Assesment of the Image Distortion in Using Various Bit Lengths of Steganographic LSB." ITM Web of Conferences 22 (2018): 01026. http://dx.doi.org/10.1051/itmconf/20182201026.

Full text
Abstract:
Several methods developed and applied for protecting the information. One of these is the stenography. Steganographic techniques are used to transmit the information in the image to the receiver in a secure manner. There are two main principles in the steganographic process. The first one is to hide the message in the image and the second one is to reduce the distortion on the image caused by information hiding. By making changes on digital images, a lot of information can be placed in the image. Nevertheless, changes in the image should not be noticed. In this paper, the effect of using vario
APA, Harvard, Vancouver, ISO, and other styles
12

Verma, Prof Saurabh, Prof Abhishek Vishwakarma, Ayush Tiwari, and Om Kesharwani. "Watermarking Techniques for Secure Data Transfer (A Review)." International Journal of Innovative Research in Computer and Communication Engineering 11, no. 06 (2023): 8890–95. http://dx.doi.org/10.15680/ijircce.2023.1106076.

Full text
Abstract:
One of most important property of digital information is that it is in principle really easy to produce and distribute unrestricted number of its copies. The actuality that an unlimited number of ideal copies of text, audio and video data can be illegally distributed and produced requires to study ways embedding copyright information and serial number in audio and video data Now a day’s internet is an necessary channel for digital assets, but it has been noticed that everybody are misusing by building illegal copies and leaking the information which creates a bad atmosphere in the field of sof
APA, Harvard, Vancouver, ISO, and other styles
13

Kulkarni, Utkarsha, Rosemeen Mansuri, and Riya Adikane. "File Storage on Cloud Using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 1950–53. http://dx.doi.org/10.22214/ijraset.2022.42652.

Full text
Abstract:
Abstract: Hybrid cryptography is implemented to provide the multilevel of encryption and decryption at both sender and receiver side which increase the security of the cloud storage. This security model gives the transparency to the cloud user. The hybrid encryption algorithm combines the advantages of fast encryption speed of AES algorithm, easy management of RSA algorithm key, and digital signature to ensure the secure transmission of confidential documents. Data/information is the most valuable asset for the modern electronic communication system. Securing data or information has become a c
APA, Harvard, Vancouver, ISO, and other styles
14

Zelenkauskaite, Asta. "Closed Captioning: Subtitling, Stenography, and the Digital Convergence of Text with Television, by Gregory J. Downey. Baltimore, MD: Johns Hopkins University Press, 2008. 400 pp. $52.00 (cloth). ISBN 978-0801887109." Information Society 26, no. 3 (2010): 241–42. http://dx.doi.org/10.1080/01972241003712314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Silberstein-Loeb, Jonathan. "Closed Captioning: Subtitling, Stenography, and the Digital Convergence of Text with Television. By Greg J. Downey. Baltimore: Johns Hopkins University Press, 2008. ix + 387 pp. Illustrations, figures, maps, notes, index. Cloth, $52.00. ISBN: 978-0-801-88710-9." Business History Review 83, no. 1 (2009): 199–201. http://dx.doi.org/10.1017/s0007680500000349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

M.Mohammed, Falath. "New Stenographic method to hiding information in digital image." Journal of University of Anbar for Pure Science 9, no. 2 (2015): 80–84. http://dx.doi.org/10.37652/juaps.2015.124504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Holmes, Tiffany. "The Corporeal Stenographer: Language, Gesture, and Cyberspace." Leonardo 32, no. 5 (1999): 383–89. http://dx.doi.org/10.1162/002409499553613.

Full text
Abstract:
The author describes her research and creative practice exploring the intersection between digital, biomedical, and linguistic modes of bodi ly representation. She synthesizes traditional forms of painting with new computer and medical imaging technologies to call into question the relationship between visible and invisible bodily forms and actions. Her paintings and installations use scientifically rendered images of the body (from symbolic DNA sequences to developing cel lular structures) in order to consider the role of the tools and technologies used to organize and view these images. The
APA, Harvard, Vancouver, ISO, and other styles
18

Reddy, Reddyvari Venkateswara. "Message Encapsulation in-Text, Image, Audio and Video." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 136–43. http://dx.doi.org/10.22214/ijraset.2024.59730.

Full text
Abstract:
Abstract: Steganography entails concealing text-based mystery records within non-textual content documents together with picture, audio, or video documents, with the extraction of the hidden records taking area at its vacation spot. This avoids detection. Steganography is a flexible and effective method hired to hide sensitive statistics inside apparently harmless cover media. This task pursuits to discover the sector of steganography, check out its diverse methods, and increase a realistic stenographic utility for securing digital information.
APA, Harvard, Vancouver, ISO, and other styles
19

Hammad, Omar Mejbel, Ikram Smaoui, Ahmed Fakhfakh, and Mohammed Mahdi Hashim. "Recent advances in digital image masking techniques Future challenges and trends: a review." SHIFRA 2024 (May 20, 2024): 67–73. http://dx.doi.org/10.70470/shifra/2024/008.

Full text
Abstract:
Image steganography has advanced over recent decades, driven by a demand for secure, high-capacity data-hiding techniques capable of maintaining imperceptibility in digital images. This study provides a comprehensive review of steganographic techniques, highlighting recent improvements across spatial and frequency domains and innovations that integrate cryptographic methods, genetic algorithms, and machine learning to enhance security and payload capacity. The assessment reveals trade-offs between imperceptibility, capacity, and security in various methods, including least significant bit (LSB
APA, Harvard, Vancouver, ISO, and other styles
20

Kaur, Rashmeet, Shivani Agarwal, and Dr Sadhana Rana. "Image Steganography." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 4261–66. http://dx.doi.org/10.22214/ijraset.2024.62552.

Full text
Abstract:
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding by information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of stenographic techniques some are more complex than others and all of them have respective strong and weak points. This project intends to give an overview of image steganography, its uses and techniques. It also supports steganography in Audio files. For a
APA, Harvard, Vancouver, ISO, and other styles
21

Boryczka, Mariusz, and Grzegorz Kazana. "Hiding Information in Digital Images Using Ant Algorithms." Entropy 25, no. 7 (2023): 963. http://dx.doi.org/10.3390/e25070963.

Full text
Abstract:
Stenographic methods are closely related to the security and confidentiality of communications, which have always been essential domains of human life. Steganography itself is a science dedicated to the process of hiding information in public communication channels. Its main idea is to use digital files or even communication protocols as a medium inside which data are hidden. The present research aims to investigate the applicability of ant algorithms in steganography and evaluate the effectiveness of this approach. Ant systems could be employed both in spatial and frequency-based image stegan
APA, Harvard, Vancouver, ISO, and other styles
22

Pawar, Prof Laxman. "Whisper-Steg: Unveil the Hidden." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 02 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28599.

Full text
Abstract:
Whisper-Steg represents a ground- breaking project at the intersection of secure messaging and advanced information concealment techniques. This innovative chat application transcends traditional boundaries by seamlessly integrating the art of steganography, offering users a novel and secure platform for communication. The project not only facilitates text and image sharing but introduces an ingenious Image Steganography feature, allowing users to embed confidential information within images. Incorporating an acknowledgment mechanism akin to popular messaging applications like WhatsApp, Whispe
APA, Harvard, Vancouver, ISO, and other styles
23

Pawlak, Piotr, Jakub Podgórniak, and Grzegorz Kozieł. "An analysis of the possibility of realization steganography in C#." Journal of Computer Sciences Institute 21 (December 30, 2021): 383–90. http://dx.doi.org/10.35784/jcsi.2761.

Full text
Abstract:
The computing power of modern computers is sufficient to break many cryptographic keys, therefore it is necessary to create an additional security layer which hides the very fact of transmitting a secret message. For this purpose, steganographic methods can be used. The article is devoted to the analysis of the possibility of implementing digital images steganography with the use of the C # programming language. Firstly, existing libraries and mathematical transformations which can help with performing steganography were found. Also, own code solutions were implemented. In order to objectively
APA, Harvard, Vancouver, ISO, and other styles
24

Pushkareva, Tatiana Vitaljevna, Ekaterina Yuryevna Ivanova, and Irina Vyacheslavovna Utkina. "Architectural model through the prism of cultural-historical tradition and new technologies." Человек и культура, no. 6 (June 2021): 20–33. http://dx.doi.org/10.25136/2409-8744.2021.6.37053.

Full text
Abstract:
This article provides a comprehensive research of the architectural model as a cultural phenomenon in cultural-historical dimension since its origin to the latest technological solutions applied in modern architectural modeling. Research methodology is based on the structural-functional and semiotic approaches. The analysis of historical-cultural and modern development of architectural model reveals the five sociocultural functions fulfilled by the architectural model in professional activity, society and culture: professional planning and coordination of architectural project; presentation of
APA, Harvard, Vancouver, ISO, and other styles
25

Et.al, G. Aparna. "An approach for Secured Image Transmission: A High Capacitive and Confidentiality based Image Steganography using Private Stego-Key." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 4190–201. http://dx.doi.org/10.17762/turcomat.v12i3.1710.

Full text
Abstract:
In the proposed paper an approach for image transmission with security and also improvement of the gray-scale (8-bit image) image flexible stenographic system using LSB approach. In this process a secret key of 80 bits is applied while embedding the message into the cover image. To provide high security and also confidentiality of the data a key stego-key is applied. The proposed method the information bits are embedded adaptively into the cover-image pixels. With this method a high embedding capacity in terms of hiding the data is provided and also better imperceptibility is also achieved. Th
APA, Harvard, Vancouver, ISO, and other styles
26

Das, Shubhankar. "An Efficient and Secure Multi-Layered Image Steganography Approach Using LSB and Lightweight XOR Encryption for Improving Time and Space Complexity." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47496.

Full text
Abstract:
Abstract:- Steganography is the practice of hiding information within another data in such a way that the presence of the hidden message is undetectable to causal observers. Encryption which makes data unreadable without a decrypt key, Steganography conceals the very existence of the data. In steganography, data is embedded within a carrier medium such as Image, Audio files, video files, Text files, Network protocols. But most popular among them is Image. For hiding secret information there exist a large variety of stenographic technique some are more complex than others and all of them have r
APA, Harvard, Vancouver, ISO, and other styles
27

CHAUDHARY, HIMANSHI, and Virendra P Vishwakarma. "A Survey: Digital Image Watermarking-Robustness and Imperceptibility." Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) 17 (September 10, 2024). http://dx.doi.org/10.2174/0123520965317013240828054013.

Full text
Abstract:
With the Internet expanding, multimedia security has become a significant problem. As digital image manipulation is getting simpler, the certification of authenticity has become more difficult. Digital watermarking outperforms conventional security methods for protecting photos from attacks. The need for reliable image authentication methods in the contemporary digital era has always been a hot topic among academics and researchers. When transmitting sensitive information today through a regular correspondence route, many hacks are possible. Everyone, therefore, requires their digital data to
APA, Harvard, Vancouver, ISO, and other styles
28

"Adaptive Steganography technique using DIDC Model." International Journal of Innovative Technology and Exploring Engineering 9, no. 8 (2020): 47–55. http://dx.doi.org/10.35940/ijitee.h6138.069820.

Full text
Abstract:
Digital media emergence has taken the world by storm, further with the growth of digital media also causes the high risk of security and it needs to be addressed. Data security is protecting the data, normally data protecting is parted into two category i.e. cryptography and stenography. Steganography provides the high-level security by hiding one data under the other; the data can be image, text or any other formats, image steganography is one of the highly research area and several researcher have proposed different technique. The main challenge in image steganography is to innocuous image w
APA, Harvard, Vancouver, ISO, and other styles
29

"Review: Dual Method Cryptography and Steganography in Video Frames in IoT." Iraqi Journal of Computer, Communication, Control and System Engineering, September 28, 2023, 139–55. http://dx.doi.org/10.33103/uot.ijccce.23.3.12.

Full text
Abstract:
The Internet of things (IoT) is one of those emerging technologies, which are going to rule the world in the next few decades. The IoT environment not only enables Human to Machine interaction but also fosters Machine to Machine connectivity. Numerous IoT devices have poor security and insufficient computing power, making them prime targets for hackers. The IoT environment uses lightweight cryptographic techniques to address security requirements. Another security method for IoT devices is steganography. In the contemporary Internet era, the ability to secure private information is crucial, an
APA, Harvard, Vancouver, ISO, and other styles
30

Tong, Jinmao, Zhongwang Cao, and Wen Fu. "Motion vector steganography algorithm of sports training video integrating with artificial bee colony algorithm and human-centered AI for web applications." Journal of Intelligent Systems 32, no. 1 (2023). http://dx.doi.org/10.1515/jisys-2022-0093.

Full text
Abstract:
Abstract In multimedia correspondence, steganography schemes are commonly applied. To reduce storage capacity, multimedia files, including images, are always compressed. Most steganographic video schemes are, therefore, not compression tolerant. In the frame sequences, the video includes extra hidden space. Artificial intelligence (AI) creates a digital world of real-time information for athletes, sponsors, and broadcasters. AI is reshaping business, and although it has already produced a significant impact on other sectors, the sports industry is the newest and most receptive one. Human-cente
APA, Harvard, Vancouver, ISO, and other styles
31

Meshram, Sakshi, Pragati Nimje, Apeksha Dhengre, Tanvi Bingewar, Gauri Shende, and Prof Naisha Taban. "Image Steganography." International Journal of Advanced Research in Science, Communication and Technology, June 9, 2021, 337–41. http://dx.doi.org/10.48175/ijarsct-1395.

Full text
Abstract:
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of stenographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of
APA, Harvard, Vancouver, ISO, and other styles
32

Rosmiyati, Juni, and Teady Matius Surya Mulyana. "WATERMARK DENGAN GABUNGAN STEGANOGRAFI DAN VISIBLE WATERMARKING." Jurnal Algoritma, Logika dan Komputasi 1, no. 1 (2018). http://dx.doi.org/10.30813/j-alu.v1i1.1109.

Full text
Abstract:
Images, that are currently circulating on the internet are many, such as advertising images for the promotion of products from a particular brand / institution, the image of the digital image, photographs of the works of famous photographers and many other examples. To identify each image appropriately, it can be added with a special logo or sign that is easily recognizable to the user. But the current advanced technology also supports duplication of the same logo / sign by irresponsible parties. Using the LSB and Grayscale methods, information such as text can be inserted into the watermark i
APA, Harvard, Vancouver, ISO, and other styles
33

Saikiran, N., M. Rama, P. Kiran, K. Sreenath, U. Prasad, and P. Thanapal Dr. "Securing Data in Image and Audio Files using Steganography Technique." International Journal of Mechanical Engineering 7, no. 2 (2022). https://doi.org/10.5281/zenodo.7550030.

Full text
Abstract:
The security of information is regarded as one of the biggest issues in communication to safeguard information because of the development of computer technology and the internet. There are numerous stenographic techniques that can be used to covertly send information to a recipient using a suitable carrier, such as text, image, audio, video, or protocol. By utilizing additional mechanisms, such as audio and video files, the techniques of audio and video steganography can be employed to conceal sensitive information. The drawing of concealing info within other info is S
APA, Harvard, Vancouver, ISO, and other styles
34

Jeyapradha M. "Advanced Information Securing by Combining Fortified Binary Image Steganography and Asymmetric Encryption Standard." International Journal of Advanced Research in Science, Communication and Technology, February 7, 2023, 175–78. http://dx.doi.org/10.48175/ijarsct-8089.

Full text
Abstract:
In information security, image steganography is one of the information securing process. Image steganography is mostly used in medical fields for hiding medical prescription data behind the medical images. Designing steganographic algorithms for empirical cover sources, such as digital images, is very perplexing due to the lack of accurate models. The most successful approach today avoids estimating the cover source distribution because this task is infeasible for complex and non-stationary sources. Instead, the steganography problem is formulated as source coding with fidelity constraint the
APA, Harvard, Vancouver, ISO, and other styles
35

Hollier, Scott, Katie M. Ellis, and Mike Kent. "User-Generated Captions: From Hackers, to the Disability Digerati, to Fansubbers." M/C Journal 20, no. 3 (2017). http://dx.doi.org/10.5204/mcj.1259.

Full text
Abstract:
Writing in the American Annals of the Deaf in 1931, Emil S. Ladner Jr, a Deaf high school student, predicted the invention of words on screen to facilitate access to “talkies”. He anticipated:Perhaps, in time, an invention will be perfected that will enable the deaf to hear the “talkies”, or an invention which will throw the words spoken directly under the screen as well as being spoken at the same time. (Ladner, cited in Downey Closed Captioning)This invention would eventually come to pass and be known as captions. Captions as we know them today have become widely available because of a compl
APA, Harvard, Vancouver, ISO, and other styles
36

Proctor, Devin. "Wandering in the City: Time, Memory, and Experience in Digital Game Space." M/C Journal 22, no. 4 (2019). http://dx.doi.org/10.5204/mcj.1549.

Full text
Abstract:
As I round the corner from Church Street onto Vesey, I am abruptly met with the façade of St. Paul’s Chapel and by the sudden memory of two things, both of which have not yet happened. I think about how, in a couple of decades, the area surrounding me will be burnt to the ground. I also recall how, just after the turn of the twenty-first century, the area will again crumble onto itself. It is 1759, and I—via my avatar—am wandering through downtown New York City in the videogame space of Assassin’s Creed: Rogue (AC:R). These spatial and temporal memories stem from the fact that I have previousl
APA, Harvard, Vancouver, ISO, and other styles
37

Hackett, Lisa J., and Jo Coghlan. "Why <em>Monopoly</em> Monopolises Popular Culture Board Games." M/C Journal 26, no. 2 (2023). http://dx.doi.org/10.5204/mcj.2956.

Full text
Abstract:
Introduction Since the early 2000s, and especially since the onset of COVID-19 and long periods of lockdown, board games have seen a revival in popularity. The increasing popularity of board games are part of what Julie Lennett, a toy industry analyst at NPD Group, describes as the “nesting trend”: families have more access to entertainment at home and are eschewing expensive nights out (cited in Birkner 7). While on-demand television is a significant factor in this trend, for Moriaty and Kay (6), who wouldn’t “welcome [the] chance to turn away from their screens” to seek the “warmth and conne
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!