Academic literature on the topic 'Images - Steganography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Images - Steganography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Images - Steganography"
Li, Mingjie, Zichi Wang, Haoxian Song, and Yong Liu. "Disguise of Steganography Behaviour: Steganography Using Image Processing with Generative Adversarial Network." Security and Communication Networks 2021 (December 8, 2021): 1–12. http://dx.doi.org/10.1155/2021/2356284.
Full textVejare, Ritvij, Abhishek Vaish, Kapish Singh, and Mrunali Desai. "Removal of Image Steganography using Generative Adversarial Network." Indian Journal of Artificial Intelligence and Neural Networking 2, no. 4 (June 30, 2022): 6–10. http://dx.doi.org/10.54105/ijainn.d1054.062422.
Full textDing, Kangyi, Teng Hu, Weina Niu, Xiaolei Liu, Junpeng He, Mingyong Yin, and Xiaosong Zhang. "A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks." Sensors 22, no. 17 (August 29, 2022): 6497. http://dx.doi.org/10.3390/s22176497.
Full textManral, Nisha. "Secure Data Transfer Using Image Steganography." International Journal for Research in Applied Science and Engineering Technology 9, no. VIII (August 10, 2021): 175–80. http://dx.doi.org/10.22214/ijraset.2021.37322.
Full textD, Shahi. "Reversible Steganography for RGB Images Using Image Interpolation." Journal of Advanced Research in Dynamical and Control Systems 12, no. 3 (March 20, 2020): 41–49. http://dx.doi.org/10.5373/jardcs/v12i3/20201165.
Full textXu, Meng, Xiangyang Luo, Jinwei Wang, and Hao Wang. "Color image steganalysis based on quaternion discrete cosine transform." Electronic Research Archive 31, no. 7 (2023): 4102–18. http://dx.doi.org/10.3934/era.2023209.
Full textZhang, Chunying, Xinkai Gao, Xiaoxiao Liu, Wei Hou, Guanghui Yang, Tao Xue, Liya Wang, and Lu Liu. "IDGAN: Information-Driven Generative Adversarial Network of Coverless Image Steganography." Electronics 12, no. 13 (June 29, 2023): 2881. http://dx.doi.org/10.3390/electronics12132881.
Full textMaurya, Indu, and S. K Gupta. "Understandable Steganography." International Journal of Engineering & Technology 7, no. 3 (June 23, 2018): 1024. http://dx.doi.org/10.14419/ijet.v7i3.8940.
Full textDamanik, Hillman Akhyar, Merry Anggraeni, and Tomi Defisa. "ANALYSIS STEGO-IMAGE EXTRACTION USING ROT13 AND LEAST SIGNIFICANT BIT (LSB) ALGORITHM METHOD ON TEXT SECURITY." Jurnal Ilmiah FIFO 9, no. 2 (November 1, 2017): 147. http://dx.doi.org/10.22441/fifo.2017.v9i2.008.
Full textMadhi, Hadi Hussein, Mustafa Sahib Shareef, Seham Ahmed Hashem, and Abdallah Waleed Ali. "Pixel steganography method for grayscale image steganography on colour images." Periodicals of Engineering and Natural Sciences (PEN) 9, no. 3 (August 11, 2021): 615. http://dx.doi.org/10.21533/pen.v9i3.2203.
Full textDissertations / Theses on the topic "Images - Steganography"
Zakaria, Ahmad. "Batch steganography and pooled steganalysis in JPEG images." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS079.
Full textABSTRACT:Batch steganography consists of hiding a message by spreading it out in a set of images, while pooled steganalysis consists of analyzing a set of images to conclude whether or not a hidden message is present. There are many strategies for spreading a message and it is reasonable to assume that the steganalyst does not know which one is being used, but it can be assumed that the steganographer uses the same embedding algorithm for all images. In this case, it can be shown that the most appropriate solution for pooled steganalysis is to use a single quantitative detector (i.e. one that predicts the size of the hidden message), to evaluate for each image the size, the hidden message (which can be zero if there is none), and to average the sizes (which are finally considered as scores) obtained over all the images.What would be the optimal solution if now the steganalyst could discriminate the spreading strategy among a set of known strategies. Could the steganalyst use a pooled steganalysis algorithm that is better than averaging the scores? Could the steganalyst obtain results close to the so-called "clairvoyant" scenario where it is assumed that the steganalyst knows exactly the spreading strategy?In this thesis, we try to answer these questions by proposing a pooled steganalysis architecture based on a quantitative image detector and an optimized score pooling function. The first contribution is a study of quantitative steganalysis algorithms in order to decide which one is best suited for pooled steganalysis. For this purpose, we propose to extend this comparison to binary steganalysis algorithms and we propose a methodology to switch from binary steganalysis results to quantitative steganalysis and vice versa.The core of the thesis lies in the second contribution. We study the scenario where the steganalyst does not know the spreading strategy. We then propose an optimized pooling function of the results based on a set of spreading strategies which improves the accuracy of the pooled steganalysis compared to a simple average. This pooling function is computed using supervised learning techniques. Experimental results obtained with six different spreading strategies and a state-of-the-art quantitative detector confirm our hypothesis. Our pooling function gives results close to a clairvoyant steganalyst who is supposed to know the spreading strategy.Keywords: Multimedia Security, Batch Steganography, Pooled Steganalysis, Machine Learning
Le, Pham [Verfasser]. "Detection of Steganography in Images with Statistical Models / Pham Le." München : Verlag Dr. Hut, 2014. http://d-nb.info/1052375162/34.
Full textOliveira, Fábio Borges de. "Analysis of the cryptography security and steganography in images sequences." Laboratório Nacional de Computação Científica, 2007. http://www.lncc.br/tdmc/tde_busca/arquivo.php?codArquivo=134.
Full textA segurança da informação vem sendo considerada de grande importância para as instituições privadas e governamentais. Por este motivo, optamos em realizar um estudo sobre segurança nesta dissertação. Iniciamos com uma introdução à teoria da informação, partimos para métodos de criptografia onde propomos um novo tipo de Segredo Perfeito e finalmente fazemos um estudo de esteganografia em uma sequência de imagens, onde propomos uma esteganografia mais agressiva nos coeficientes da transformada discreta de cosseno.
ESCOBAR, JAISSE GRELA. "A TOOL FOR TRACKING VIDEOS AND IMAGES USING STEGANOGRAPHY TECHNIQUES." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2015. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=25814@1.
Full textCOORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
PROGRAMA DE EXCELENCIA ACADEMICA
Na indústria de TV frequentemente ocorrem vazamentos de materiais de filmagem quando estes se distribuem entre os colaboradores de produção, prejudicando grandemente as empresas. Neste trabalho propomos uma ferramenta que, utilizando técnicas de esteganografia adaptativa, permite detectar a fonte do vazamento com um elevado grau de confiança. Um requisito importante é que a informação mascarada no vídeo (ou na imagem) resista a operações de processamento tais como redimensionamento e mudança de resolução. A ideia é usar o algoritmo Speeded Up Robust Features (SURF), estratégia consagrada, na detecção e descrição de características em imagens para detectar regiões robustas da imagem e inserir nelas uma pequena identificação mascarada. A ferramenta utiliza a transformada Haar – Discrete Wavelet Transform em duas dimensões, para depois fazer modificações na imagem. Esta dissertação propõe direções iniciais promissoras para a identificação segura de certificados de origem de imagens e vídeos.
In the TV industry, leaks of film materials occur frequently when they are distributed among the members of the production team, causing great harm to the companies. In this paper, we propose a tool that allows detecting the source of the leak with a high degree of confidence, using techniques of adaptive steganography. An important requirement is that the information embedded in the video (or image) should resist to processing operations such as resizing and resolution changes. The idea is to use the Speeded Up Robust Features (SURF) algorithm, a well-known strategy for detection and description of images features, to detect the robust regions of the image and insert a small masked identification in them. The tool uses the Haar - Discrete Wavelet Transform in two dimensions and then modifies the image. This dissertation proposes promising initial directions for secure identification of the certificate of origin of digital images and videos.
Grajeda, Marín Ismael Rufino. "Increase in the information payload for steganography in digital images." Tesis de Licenciatura, Universidad Autónoma del Estado de México, 2019. http://hdl.handle.net/20.500.11799/105009.
Full textCerkez, Paul. "Automated Detection of Semagram-Laden Images." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/115.
Full textChandrababu, Aron. "Using an artificial neural network to detect the presence of image steganography." Akron, OH : University of Akron, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=akron1237343521.
Full text"May, 2009." Title from electronic thesis title page (viewed 11/18/2009) Advisor, Kathy J. Liszka; Faculty Readers, Timothy W. O'Neil, Tim Margush; Department Chair, Wolfgang Pelz; Dean of the College, Chand Midha; Dean of the Graduate School, George R. Newkome. Includes bibliographical references.
Thorpe, Christopher. "Compression aided feature based steganalysis of perturbed quantization steganography in JPEG images." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 114 p, 2008. http://proquest.umi.com/pqdweb?did=1459914021&sid=6&Fmt=2&clientId=8331&RQT=309&VName=PQD.
Full textRwabutaza, Allan Anthony. "A Cryptanalysis Methodology for the Reverse Engineering of Encrypted Information in Images." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1261417786.
Full textAbdulla, Alan Anwer. "Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography." Thesis, University of Buckingham, 2015. http://bear.buckingham.ac.uk/149/.
Full textBooks on the topic "Images - Steganography"
Yahya, Abid. Steganography Techniques for Digital Images. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-78597-4.
Full textCurrie, Daniel L. Implementation and efficiency of steganographic techniques in bitmapped images and embedded data survivability against lossy compression schemes. Monterey, Calif: Naval Postgraduate School, 1996.
Find full textYahya, Abid. Steganography Techniques for Digital Images. Springer International Publishing AG, 2019.
Find full text(Editor), Stefan Katzenbeisser, and Fabien, A.P. Petitcolas (Editor), eds. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers, 2000.
Find full textDigital Image and Video Watermarking and Steganography [Working Title]. IntechOpen, 2018. http://dx.doi.org/10.5772/intechopen.75155.
Full textBook chapters on the topic "Images - Steganography"
Yahya, Abid. "Steganography Techniques." In Steganography Techniques for Digital Images, 9–42. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78597-4_2.
Full textYahya, Abid. "Introduction to Steganography." In Steganography Techniques for Digital Images, 1–7. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78597-4_1.
Full textYahya, Abid. "Characteristic Region-Based Image Steganography." In Steganography Techniques for Digital Images, 43–83. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78597-4_3.
Full textYahya, Abid. "An Enhanced Robust and Protected Image Steganographic System." In Steganography Techniques for Digital Images, 85–111. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78597-4_4.
Full textYahya, Abid. "Conclusion Toward Hidden Communication." In Steganography Techniques for Digital Images, 113–17. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78597-4_5.
Full textModi, Mangat Rai, Saiful Islam, and Phalguni Gupta. "Edge Based Steganography on Colored Images." In Intelligent Computing Theories, 593–600. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39479-9_69.
Full textJagadeesh, Noopa, Aishwarya Nandakumar, P. Harmya, and S. S. Anju. "Secret Image Sharing Using Steganography with Different Cover Images." In Advances in Computing and Communications, 490–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22714-1_50.
Full textAgaian, Sos S., and Ravindranath C. Cherukuri. "Run Length Based Steganography for Binary Images." In Lecture Notes in Computer Science, 481–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11590316_75.
Full textGupta, Anjali, Lalit K. Awasthi, and Samayveer Singh. "Steganography Methods for GIF Images: A Review." In Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security, 657–70. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-1479-1_49.
Full textHemalatha, S., U. Dinesh Acharya, A. Renuka, and Priya R. Kamath. "A Secure Image Steganography Technique to Hide Multiple Secret Images." In Lecture Notes in Electrical Engineering, 613–20. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-6154-8_60.
Full textConference papers on the topic "Images - Steganography"
Mojsilović, Marija, Selver Pepić, and Goran Miodragović. "Implementation of embedded messages using steganography in the PHP software package." In 9th International Scientific Conference Technics and Informatics in Education. University of Kragujevac, Faculty of Technical Sciences Čačak, 2022. http://dx.doi.org/10.46793/tie22.171m.
Full textSaha, Abhisek, Sholanki Halder, and Shama Kollya. "Image steganography using 24-bit bitmap images." In 2011 14th International Conference on Computer and Information Technology (ICCIT). IEEE, 2011. http://dx.doi.org/10.1109/iccitechn.2011.6164873.
Full textSange, Sanjay R., Suhas M. Patil, Sudeep Thepade, and Nilesh N. Gawade. "Steganography: Hiding Half Tone Images." In 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA). IEEE, 2018. http://dx.doi.org/10.1109/iccubea.2018.8697558.
Full textCheddad, Abbas, Joan Condell, Kevin Curran, and Paul Mc Kevitt. "Enhancing Steganography in Digital Images." In 2008 Canadian Conference on Computer and Robot Vision (CRV). IEEE, 2008. http://dx.doi.org/10.1109/crv.2008.54.
Full textSpaulding, Jeremiah, Hideki Noda, Mahdad N. Shirazi, Michiharu Niimi, and Eiji Kawaguchi. "Steganography using wavelet compressed images." In Photonics West 2001 - Electronic Imaging, edited by Ping W. Wong and Edward J. Delp III. SPIE, 2001. http://dx.doi.org/10.1117/12.435415.
Full textMei-Ching Chen, Sos S. Agaian, and C. L. Philip Chen. "Generalized collage steganography on images." In 2008 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE, 2008. http://dx.doi.org/10.1109/icsmc.2008.4811419.
Full textMarwaha, Piyush, and Paresh Marwaha. "Visual cryptographic steganography in images." In 2010 International Conference on Computing, Communication and Networking Technologies (ICCCNT'10). IEEE, 2010. http://dx.doi.org/10.1109/icccnt.2010.5591730.
Full textGopalan, Kaliappan. "An image steganography implementation for JPEG-compressed images." In 2007 International Symposium on Communications and Information Technologies. IEEE, 2007. http://dx.doi.org/10.1109/iscit.2007.4392114.
Full textAgaian, Sos S., and Johanna M. Susmilch. "Fractal steganography using artificially generated images." In 2006 IEEE Region 5 Conference. IEEE, 2006. http://dx.doi.org/10.1109/tpsd.2006.5507412.
Full textYang, Ching-Nung, Yao-Yu Yang, Tse-Shih Chen, and Guo-Cin Ye. "New Steganography Scheme in Halftone Images." In 2008 Fourth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2008. http://dx.doi.org/10.1109/iih-msp.2008.265.
Full textReports on the topic "Images - Steganography"
Duffany, Jeffrey L., and Marcus D. Velez. Steganography and Steganalysis in Digital Images. Fort Belvoir, VA: Defense Technical Information Center, January 2012. http://dx.doi.org/10.21236/ada582940.
Full textMarvel, Lisa M. Image Steganography for Hidden Communication. Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada377277.
Full textMarvel, Lisa M., Charles G. Boncelet, Retter Jr., and Charles T. Methodology of Spread-Spectrum Image Steganography. Fort Belvoir, VA: Defense Technical Information Center, June 1998. http://dx.doi.org/10.21236/ada349102.
Full textBrundick, Frederick S., and Lisa M. Marvel. Implementation of Spread Spectrum Image Steganography. Fort Belvoir, VA: Defense Technical Information Center, March 2001. http://dx.doi.org/10.21236/ada392155.
Full textBrundick, Frederick S., George W. Hartwig, Marvel Jr., and Lisa M. Reducing Spread Spectrum Image Steganography (SSIS) Extraction Errors With Feedback-Driven Adjustment. Fort Belvoir, VA: Defense Technical Information Center, December 2002. http://dx.doi.org/10.21236/ada409026.
Full text