Journal articles on the topic 'Images - Steganography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Images - Steganography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Li, Mingjie, Zichi Wang, Haoxian Song, and Yong Liu. "Disguise of Steganography Behaviour: Steganography Using Image Processing with Generative Adversarial Network." Security and Communication Networks 2021 (December 8, 2021): 1–12. http://dx.doi.org/10.1155/2021/2356284.
Full textVejare, Ritvij, Abhishek Vaish, Kapish Singh, and Mrunali Desai. "Removal of Image Steganography using Generative Adversarial Network." Indian Journal of Artificial Intelligence and Neural Networking 2, no. 4 (June 30, 2022): 6–10. http://dx.doi.org/10.54105/ijainn.d1054.062422.
Full textDing, Kangyi, Teng Hu, Weina Niu, Xiaolei Liu, Junpeng He, Mingyong Yin, and Xiaosong Zhang. "A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks." Sensors 22, no. 17 (August 29, 2022): 6497. http://dx.doi.org/10.3390/s22176497.
Full textManral, Nisha. "Secure Data Transfer Using Image Steganography." International Journal for Research in Applied Science and Engineering Technology 9, no. VIII (August 10, 2021): 175–80. http://dx.doi.org/10.22214/ijraset.2021.37322.
Full textD, Shahi. "Reversible Steganography for RGB Images Using Image Interpolation." Journal of Advanced Research in Dynamical and Control Systems 12, no. 3 (March 20, 2020): 41–49. http://dx.doi.org/10.5373/jardcs/v12i3/20201165.
Full textXu, Meng, Xiangyang Luo, Jinwei Wang, and Hao Wang. "Color image steganalysis based on quaternion discrete cosine transform." Electronic Research Archive 31, no. 7 (2023): 4102–18. http://dx.doi.org/10.3934/era.2023209.
Full textZhang, Chunying, Xinkai Gao, Xiaoxiao Liu, Wei Hou, Guanghui Yang, Tao Xue, Liya Wang, and Lu Liu. "IDGAN: Information-Driven Generative Adversarial Network of Coverless Image Steganography." Electronics 12, no. 13 (June 29, 2023): 2881. http://dx.doi.org/10.3390/electronics12132881.
Full textMaurya, Indu, and S. K Gupta. "Understandable Steganography." International Journal of Engineering & Technology 7, no. 3 (June 23, 2018): 1024. http://dx.doi.org/10.14419/ijet.v7i3.8940.
Full textDamanik, Hillman Akhyar, Merry Anggraeni, and Tomi Defisa. "ANALYSIS STEGO-IMAGE EXTRACTION USING ROT13 AND LEAST SIGNIFICANT BIT (LSB) ALGORITHM METHOD ON TEXT SECURITY." Jurnal Ilmiah FIFO 9, no. 2 (November 1, 2017): 147. http://dx.doi.org/10.22441/fifo.2017.v9i2.008.
Full textMadhi, Hadi Hussein, Mustafa Sahib Shareef, Seham Ahmed Hashem, and Abdallah Waleed Ali. "Pixel steganography method for grayscale image steganography on colour images." Periodicals of Engineering and Natural Sciences (PEN) 9, no. 3 (August 11, 2021): 615. http://dx.doi.org/10.21533/pen.v9i3.2203.
Full textKhairunnisak, Khairunnisak, Gilang Miftakhul Fahmi, and Didit Suhartono. "Implementasi Steganografi Gambar Menggunakan Algoritma Generative Adversarial Network." SINTECH (Science and Information Technology) Journal 6, no. 1 (April 30, 2023): 47–57. http://dx.doi.org/10.31598/sintechjournal.v6i1.1258.
Full textSailaja, B., K. Meghana, Damayanthi S. Harika, S. Sandhya, and Sushma V. Satya. "Secure multimedia data transfer using crypto and stegano algorithms." i-manager’s Journal on Software Engineering 16, no. 4 (2022): 9. http://dx.doi.org/10.26634/jse.16.4.18820.
Full textKhaldi, Amine. "Steganographic Techniques Classification According to Image Format." International Annals of Science 8, no. 1 (November 4, 2019): 143–49. http://dx.doi.org/10.21467/ias.8.1.143-149.
Full textOuyang, Chun-Juan, Ming Leng, Jie-Wu Xia, and Huan Liu. "Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1790268.
Full textKhandait, P. D., S. P. Khandait, K. K. Ingole, and Manjusha Talmale. "Component analysis of matrix pattern on RGB images for image stegano-key in MATLAB." Open Journal of Science and Technology 4, no. 2 (September 6, 2021): 70–76. http://dx.doi.org/10.31580/ojst.v4i2.1704.
Full textSALLEE, PHIL. "MODEL-BASED METHODS FOR STEGANOGRAPHY AND STEGANALYSIS." International Journal of Image and Graphics 05, no. 01 (January 2005): 167–89. http://dx.doi.org/10.1142/s0219467805001719.
Full textFarhad Khorshid, Shler. "Coverless Image Steganography: Review." Academic Journal of Nawroz University 11, no. 3 (August 26, 2022): 314–26. http://dx.doi.org/10.25007/ajnu.v11n3a1460.
Full textProgonov, Dmytro, and Mariia Yarysh. "Analyzing the accuracy of detecting steganograms formed by adaptive steganographic methods when using artificial neural networks." Eastern-European Journal of Enterprise Technologies 1, no. 9(115) (February 28, 2022): 45–55. http://dx.doi.org/10.15587/1729-4061.2022.251350.
Full textIglesias, Patricia, Miguel-Angel Sicilia, and Elena García-Barriocanal. "Detecting Browser Drive-By Exploits in Images Using Deep Learning." Electronics 12, no. 3 (January 17, 2023): 473. http://dx.doi.org/10.3390/electronics12030473.
Full textPrasad, Swaroop Shankar, Ofer Hadar, and Ilia Polian. "Detection of Malicious Spatial-Domain Steganography over Noisy Channels Using Convolutional Neural Networks." Electronic Imaging 2020, no. 4 (January 26, 2020): 76–1. http://dx.doi.org/10.2352/issn.2470-1173.2020.4.mwsf-076.
Full textZhu, Xishun, Zhengliang Lai, Nanrun Zhou, and Jianhua Wu. "Steganography with High Reconstruction Robustness: Hiding of Encrypted Secret Images." Mathematics 10, no. 16 (August 15, 2022): 2934. http://dx.doi.org/10.3390/math10162934.
Full textViddin, Irsandy Maulana Satya, Antonius Cahya Prihandoko, and Diksy Media Firmansyah. "An authentication alternative using histogram shifting steganography method." Jurnal Teknologi dan Sistem Komputer 9, no. 2 (February 26, 2021): 106–12. http://dx.doi.org/10.14710/jtsiskom.2021.13931.
Full textAgrawal, Rohit, Kapil Ahuja, Marc C. Steinbach, and Thomas Wick. "SABMIS: sparse approximation based blind multi-image steganography scheme." PeerJ Computer Science 8 (November 28, 2022): e1080. http://dx.doi.org/10.7717/peerj-cs.1080.
Full textRehman, Amjad, Tanzila Saba, Toqeer Mahmood, Zahid Mehmood, Mohsin Shah, and Adeel Anjum. "Data hiding technique in steganography for information security using number theory." Journal of Information Science 45, no. 6 (December 6, 2018): 767–78. http://dx.doi.org/10.1177/0165551518816303.
Full textZhong, Nan, Zhenxing Qian, Zichi Wang, and Xinpeng Zhang. "Steganography in stylized images." Journal of Electronic Imaging 28, no. 03 (May 14, 2019): 1. http://dx.doi.org/10.1117/1.jei.28.3.033005.
Full textFadlil, Affan, Budi Prasetiyo, and Alamsyah Alamsyah. "Increasing Message Capacity in Images Using Advanced Least Significant Bit and Image Scaling." Scientific Journal of Informatics 8, no. 2 (November 30, 2021): 268–75. http://dx.doi.org/10.15294/sji.v8i2.28138.
Full textBin Sulong, Ghazali, and Maria A.Wimmer. "Image hiding by using spatial domain steganography." Wasit Journal of Computer and Mathematics Science 2, no. 1 (March 31, 2023): 39–45. http://dx.doi.org/10.31185/wjcm.110.
Full textZhu, Jie, Xianfeng Zhao, and Qingxiao Guan. "Detecting and Distinguishing Adaptive and Non-Adaptive Steganography by Image Segmentation." International Journal of Digital Crime and Forensics 11, no. 1 (January 2019): 62–77. http://dx.doi.org/10.4018/ijdcf.2019010105.
Full textChang, Ching-Chun. "Neural Reversible Steganography with Long Short-Term Memory." Security and Communication Networks 2021 (April 4, 2021): 1–14. http://dx.doi.org/10.1155/2021/5580272.
Full textYalla, Surya Prakash, Archana Uriti, and Abhisek Sethy. "GUI Implementation of Modified and Secure Image Steganography Using Least Significant Bit Substitution." International Journal of Safety and Security Engineering 12, no. 5 (November 30, 2022): 639–43. http://dx.doi.org/10.18280/ijsse.120513.
Full textRadhe, Shyam Panda, Gupta Deepika, Jaiswal Madhuri, Kasar Vaishnavi, and A. L. Prasanna. "Image steganography approach using spatial and transform domain technique." i-manager's Journal on Computer Science 10, no. 1 (2022): 21. http://dx.doi.org/10.26634/jcom.10.1.18504.
Full textSundos A. Hameed Al-azawi and Abbas A. AbulHameed. "Information Hiding in Color Image Using Steganographic technique." Journal of the College of Basic Education 17, no. 70 (December 22, 2022): 113–22. http://dx.doi.org/10.35950/cbej.vi.8480.
Full textKadam, Gayatri Ulhas, Purva Ignathi Jadhav, Trupti Shahaji Chandanshive, Kajal Vilas Shinde, and Mrs Ashwini Bamanikar. "Multi Images Steganography using Neural Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 406–10. http://dx.doi.org/10.22214/ijraset.2022.41242.
Full textMelman, A. S., P. O. Petrov, A. A. Shelupanov, A. V. Aristov, and Y. P. Pokholkov. "Embedding information into JPEG images with distortion masking in frequency domain." Proceedings of Tomsk State University of Control Systems and Radioelectronics 23, no. 4 (December 25, 2020): 45–50. http://dx.doi.org/10.21293/1818-0442-2020-23-4-45-50.
Full textKoshkina, N. "About JPEG Images Parameters Impact to Steganalys Accuracy." Cybernetics and Computer Technologies, no. 1 (March 30, 2021): 74–85. http://dx.doi.org/10.34229/2707-451x.21.1.8.
Full textModupe, Alade Oluwaseun, Amusan Elizabeth Adedoyin, and Adedeji Oluyinka Titilayo. "A Comparative Analysis of LSB, MSB and PVD Based Image Steganography." International Journal of Research and Review 8, no. 9 (September 23, 2021): 373–77. http://dx.doi.org/10.52403/ijrr.20210948.
Full textJaradat, Aya, Eyad Taqieddin, and Moad Mowafi. "A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization." Security and Communication Networks 2021 (June 7, 2021): 1–11. http://dx.doi.org/10.1155/2021/6679284.
Full textDuan, Xintao, Nao Liu, Mengxiao Gou, Wenxin Wang, and Chuan Qin. "SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network." Entropy 22, no. 10 (October 8, 2020): 1140. http://dx.doi.org/10.3390/e22101140.
Full textBi, Xinliang, Xiaoyuan Yang, Chao Wang, and Jia Liu. "High-Capacity Image Steganography Algorithm Based on Image Style Transfer." Security and Communication Networks 2021 (September 28, 2021): 1–14. http://dx.doi.org/10.1155/2021/4179340.
Full textAbbas, Prof Dr Tawfiq Abdulkhaleq. "Steganography Using Fractal Images Technique." IOSR Journal of Engineering 4, no. 2 (February 2014): 52–61. http://dx.doi.org/10.9790/3021-04225261.
Full textFarn, En-Jung. "Jigsaw puzzle images for steganography." Optical Engineering 48, no. 7 (July 1, 2009): 077006. http://dx.doi.org/10.1117/1.3159872.
Full textPo-Chyi Su and C. C. J. Kuo. "Steganography in JPEG2000 compressed images." IEEE Transactions on Consumer Electronics 49, no. 4 (November 2003): 824–32. http://dx.doi.org/10.1109/tce.2003.1261161.
Full textLuo, X., F. Liu, C. Yang, S. Lian, and D. Wang. "On F5 Steganography in Images." Computer Journal 55, no. 4 (September 12, 2011): 447–56. http://dx.doi.org/10.1093/comjnl/bxr092.
Full textMohammed Zaki, Hassan. "Color Pattern Steganography in Images." Technium: Romanian Journal of Applied Sciences and Technology 9 (April 21, 2023): 60–65. http://dx.doi.org/10.47577/technium.v9i.8337.
Full textPan, Ping, Zeming Wu, Chen Yang, and Bing Zhao. "Double-Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi-Region Coverage." Entropy 24, no. 2 (February 7, 2022): 246. http://dx.doi.org/10.3390/e24020246.
Full textWu, Han-Yan, Ling-Hwei Chen, and Yu-Tai Ching. "Block-Based Steganography Method Using Optimal Selection to Reach High Efficiency and Capacity for Palette Images." Applied Sciences 10, no. 21 (November 4, 2020): 7820. http://dx.doi.org/10.3390/app10217820.
Full textMiftahul Amri, Muhammad, Mahamadaree Waeno, and Muhammad Zain Musa. "LSB Steganography to Embed Creator's Watermark in Batik Digital Arts." Engineering Science Letter 2, no. 01 (March 11, 2023): 27–32. http://dx.doi.org/10.56741/esl.v2i01.301.
Full textCh., Rupa. "Squint Pixel Steganography." International Journal of Digital Crime and Forensics 8, no. 4 (October 2016): 37–47. http://dx.doi.org/10.4018/ijdcf.2016100104.
Full textPawlak, Piotr, Jakub Podgórniak, and Grzegorz Kozieł. "An analysis of the possibility of realization steganography in C#." Journal of Computer Sciences Institute 21 (December 30, 2021): 383–90. http://dx.doi.org/10.35784/jcsi.2761.
Full textEl Abbadi, Nidhal. "New Algorithm for Text in Text Steganography." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 2 (October 26, 2021): 99–112. http://dx.doi.org/10.55562/jrucs.v23i2.483.
Full text