Journal articles on the topic 'Digital stenography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 37 journal articles for your research on the topic 'Digital stenography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Andersdotter, Karolina, and Malin Nauwerck. "Secretaries at Work." Digital Humanities in the Nordic and Baltic Countries Publications 4, no. 1 (2022): 9–22. http://dx.doi.org/10.5617/dhnbpub.11271.
Full textSackey, Abraham Kwaku. "Steganography Based On Random Pixel Selection for Efficient Data Hiding." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (2022): 113–20. http://dx.doi.org/10.22624/aims/digital/v10n4p12.
Full textKwaku, Timothy. "Steganalysis Method for LSB Replacement Based On Local Gradient of Image Histogram." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (2022): 1–8. http://dx.doi.org/10.22624/aims/digital/v10n4p1.
Full textDe Silva, Pavani Yashodha, and Gamage Upeksha Ganegoda. "New Trends of Digital Data Storage in DNA." BioMed Research International 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/8072463.
Full textA. Al Smadi, Takialddin, and Mohammed Maitah. "An Efficiency and Algorithm Detection for Stenography in Digital Symbols." International Journal of Computer Network and Information Security 6, no. 1 (2013): 34–38. http://dx.doi.org/10.5815/ijcnis.2014.01.05.
Full textSwati. M, Miss Mugale. "Survey Paper on Secret Sharing Schema for Digital Quick Response Code Applications." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (2021): 3107–9. http://dx.doi.org/10.22214/ijraset.2021.37023.
Full textDai, Guo Yong, and Lu Yi Chen. "Data Hiding in Digital Image Based on Color Difference." Advanced Materials Research 760-762 (September 2013): 1547–51. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.1547.
Full textKöhler, Mirko, Ivica Lukić, and Višnja Križanović Čik. "Protecting Information with Subcodstanography." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/9130683.
Full textSusan B. Barnes. "Closed Captioning: Subtitling, Stenography, and the Digital Convergence of Text with Television (review)." Technology and Culture 50, no. 2 (2009): 469–71. http://dx.doi.org/10.1353/tech.0.0271.
Full textSukhdeep, kaur* Karandeep singh. "STEGANOGRAPHY SYSTEM FOR HIDING TEXT INTO AUDIO SIGNAL USING I-LSB TECHNIQUE & COMPRESSION ALGORITHM (LZW & ADAPTIVE HUFFMAN)." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 786–91. https://doi.org/10.5281/zenodo.221013.
Full textInan, Yucel. "Assesment of the Image Distortion in Using Various Bit Lengths of Steganographic LSB." ITM Web of Conferences 22 (2018): 01026. http://dx.doi.org/10.1051/itmconf/20182201026.
Full textVerma, Prof Saurabh, Prof Abhishek Vishwakarma, Ayush Tiwari, and Om Kesharwani. "Watermarking Techniques for Secure Data Transfer (A Review)." International Journal of Innovative Research in Computer and Communication Engineering 11, no. 06 (2023): 8890–95. http://dx.doi.org/10.15680/ijircce.2023.1106076.
Full textKulkarni, Utkarsha, Rosemeen Mansuri, and Riya Adikane. "File Storage on Cloud Using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 1950–53. http://dx.doi.org/10.22214/ijraset.2022.42652.
Full textZelenkauskaite, Asta. "Closed Captioning: Subtitling, Stenography, and the Digital Convergence of Text with Television, by Gregory J. Downey. Baltimore, MD: Johns Hopkins University Press, 2008. 400 pp. $52.00 (cloth). ISBN 978-0801887109." Information Society 26, no. 3 (2010): 241–42. http://dx.doi.org/10.1080/01972241003712314.
Full textSilberstein-Loeb, Jonathan. "Closed Captioning: Subtitling, Stenography, and the Digital Convergence of Text with Television. By Greg J. Downey. Baltimore: Johns Hopkins University Press, 2008. ix + 387 pp. Illustrations, figures, maps, notes, index. Cloth, $52.00. ISBN: 978-0-801-88710-9." Business History Review 83, no. 1 (2009): 199–201. http://dx.doi.org/10.1017/s0007680500000349.
Full textM.Mohammed, Falath. "New Stenographic method to hiding information in digital image." Journal of University of Anbar for Pure Science 9, no. 2 (2015): 80–84. http://dx.doi.org/10.37652/juaps.2015.124504.
Full textHolmes, Tiffany. "The Corporeal Stenographer: Language, Gesture, and Cyberspace." Leonardo 32, no. 5 (1999): 383–89. http://dx.doi.org/10.1162/002409499553613.
Full textReddy, Reddyvari Venkateswara. "Message Encapsulation in-Text, Image, Audio and Video." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 136–43. http://dx.doi.org/10.22214/ijraset.2024.59730.
Full textHammad, Omar Mejbel, Ikram Smaoui, Ahmed Fakhfakh, and Mohammed Mahdi Hashim. "Recent advances in digital image masking techniques Future challenges and trends: a review." SHIFRA 2024 (May 20, 2024): 67–73. http://dx.doi.org/10.70470/shifra/2024/008.
Full textKaur, Rashmeet, Shivani Agarwal, and Dr Sadhana Rana. "Image Steganography." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 4261–66. http://dx.doi.org/10.22214/ijraset.2024.62552.
Full textBoryczka, Mariusz, and Grzegorz Kazana. "Hiding Information in Digital Images Using Ant Algorithms." Entropy 25, no. 7 (2023): 963. http://dx.doi.org/10.3390/e25070963.
Full textPawar, Prof Laxman. "Whisper-Steg: Unveil the Hidden." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 02 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28599.
Full textPawlak, Piotr, Jakub Podgórniak, and Grzegorz Kozieł. "An analysis of the possibility of realization steganography in C#." Journal of Computer Sciences Institute 21 (December 30, 2021): 383–90. http://dx.doi.org/10.35784/jcsi.2761.
Full textPushkareva, Tatiana Vitaljevna, Ekaterina Yuryevna Ivanova, and Irina Vyacheslavovna Utkina. "Architectural model through the prism of cultural-historical tradition and new technologies." Человек и культура, no. 6 (June 2021): 20–33. http://dx.doi.org/10.25136/2409-8744.2021.6.37053.
Full textEt.al, G. Aparna. "An approach for Secured Image Transmission: A High Capacitive and Confidentiality based Image Steganography using Private Stego-Key." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 4190–201. http://dx.doi.org/10.17762/turcomat.v12i3.1710.
Full textDas, Shubhankar. "An Efficient and Secure Multi-Layered Image Steganography Approach Using LSB and Lightweight XOR Encryption for Improving Time and Space Complexity." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47496.
Full textCHAUDHARY, HIMANSHI, and Virendra P Vishwakarma. "A Survey: Digital Image Watermarking-Robustness and Imperceptibility." Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) 17 (September 10, 2024). http://dx.doi.org/10.2174/0123520965317013240828054013.
Full text"Adaptive Steganography technique using DIDC Model." International Journal of Innovative Technology and Exploring Engineering 9, no. 8 (2020): 47–55. http://dx.doi.org/10.35940/ijitee.h6138.069820.
Full text"Review: Dual Method Cryptography and Steganography in Video Frames in IoT." Iraqi Journal of Computer, Communication, Control and System Engineering, September 28, 2023, 139–55. http://dx.doi.org/10.33103/uot.ijccce.23.3.12.
Full textTong, Jinmao, Zhongwang Cao, and Wen Fu. "Motion vector steganography algorithm of sports training video integrating with artificial bee colony algorithm and human-centered AI for web applications." Journal of Intelligent Systems 32, no. 1 (2023). http://dx.doi.org/10.1515/jisys-2022-0093.
Full textMeshram, Sakshi, Pragati Nimje, Apeksha Dhengre, Tanvi Bingewar, Gauri Shende, and Prof Naisha Taban. "Image Steganography." International Journal of Advanced Research in Science, Communication and Technology, June 9, 2021, 337–41. http://dx.doi.org/10.48175/ijarsct-1395.
Full textRosmiyati, Juni, and Teady Matius Surya Mulyana. "WATERMARK DENGAN GABUNGAN STEGANOGRAFI DAN VISIBLE WATERMARKING." Jurnal Algoritma, Logika dan Komputasi 1, no. 1 (2018). http://dx.doi.org/10.30813/j-alu.v1i1.1109.
Full textSaikiran, N., M. Rama, P. Kiran, K. Sreenath, U. Prasad, and P. Thanapal Dr. "Securing Data in Image and Audio Files using Steganography Technique." International Journal of Mechanical Engineering 7, no. 2 (2022). https://doi.org/10.5281/zenodo.7550030.
Full textJeyapradha M. "Advanced Information Securing by Combining Fortified Binary Image Steganography and Asymmetric Encryption Standard." International Journal of Advanced Research in Science, Communication and Technology, February 7, 2023, 175–78. http://dx.doi.org/10.48175/ijarsct-8089.
Full textHollier, Scott, Katie M. Ellis, and Mike Kent. "User-Generated Captions: From Hackers, to the Disability Digerati, to Fansubbers." M/C Journal 20, no. 3 (2017). http://dx.doi.org/10.5204/mcj.1259.
Full textProctor, Devin. "Wandering in the City: Time, Memory, and Experience in Digital Game Space." M/C Journal 22, no. 4 (2019). http://dx.doi.org/10.5204/mcj.1549.
Full textHackett, Lisa J., and Jo Coghlan. "Why <em>Monopoly</em> Monopolises Popular Culture Board Games." M/C Journal 26, no. 2 (2023). http://dx.doi.org/10.5204/mcj.2956.
Full text