Academic literature on the topic 'Steganographic capacity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Steganographic capacity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Steganographic capacity"

1

Tian, Hui, Jie Qin, Yongfeng Huang, et al. "A High-Capacity Covering Code for Voice-Over-IP Steganography." International Journal of Information Technology and Web Engineering 10, no. 3 (2015): 46–63. http://dx.doi.org/10.4018/ijitwe.2015070104.

Full text
Abstract:
Although steganographic transparency and embedding capacity are considered to be two conflicting objectives in the design of steganographic systems, it is possible and necessary to strike a good balance between them in Voice-over-IP steganography. In this paper, to improve steganographic transparency while maintaining relatively large embedding capacity, the authors present a (2n-1, 2n) covering code, which can hide 2n-1 bits of secret messages into 2n bits of cover messages with not more than n-bit changed. Specifically, each (2n-1)-bit secret message is first transformed into two 2n-bit cand
APA, Harvard, Vancouver, ISO, and other styles
2

Araujo, Istteffanny Isloure, and Hassan Kazemian. "Improving Steganographic capacity using distributed steganography over BMP." Multimedia Tools and Applications 79, no. 35-36 (2020): 26181–95. http://dx.doi.org/10.1007/s11042-020-09298-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Yamin, Jun Zhang, Zhongliang Yang, and Ru Zhang. "Topic-aware Neural Linguistic Steganography Based on Knowledge Graphs." ACM/IMS Transactions on Data Science 2, no. 2 (2021): 1–13. http://dx.doi.org/10.1145/3418598.

Full text
Abstract:
The core challenge of steganography is always how to improve the hidden capacity and the concealment. Most current generation-based linguistic steganography methods only consider the probability distribution between text characters, and the emotion and topic of the generated steganographic text are uncontrollable. Especially for long texts, generating several sentences related to a topic and displaying overall coherence and discourse-relatedness can ensure better concealment. In this article, we address the problem of generating coherent multi-sentence texts for better concealment, and a topic
APA, Harvard, Vancouver, ISO, and other styles
4

Chang, Ching-Chun. "Neural Reversible Steganography with Long Short-Term Memory." Security and Communication Networks 2021 (April 4, 2021): 1–14. http://dx.doi.org/10.1155/2021/5580272.

Full text
Abstract:
Deep learning has brought about a phenomenal paradigm shift in digital steganography. However, there is as yet no consensus on the use of deep neural networks in reversible steganography, a class of steganographic methods that permits the distortion caused by message embedding to be removed. The underdevelopment of the field of reversible steganography with deep learning can be attributed to the perception that perfect reversal of steganographic distortion seems scarcely achievable, due to the lack of transparency and interpretability of neural networks. Rather than employing neural networks i
APA, Harvard, Vancouver, ISO, and other styles
5

Harmsen, Jeremiah J., and William A. Pearlman. "Capacity of Steganographic Channels." IEEE Transactions on Information Theory 55, no. 4 (2009): 1775–92. http://dx.doi.org/10.1109/tit.2009.2012991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ouyang, Chun-Juan, Chang-Xin Liu, Ming Leng, and Huan Liu. "An OMP Steganographic Algorithm Optimized by SFLA." International Journal of Pattern Recognition and Artificial Intelligence 31, no. 01 (2017): 1754001. http://dx.doi.org/10.1142/s0218001417540015.

Full text
Abstract:
In this paper, we propose a novel steganographic method, which utilizes the sparsity and integrity of the image compressed sensing to reduce the risk of being detected by steganalysis. In the proposed algorithm, the message hiding process is integrated into the image sparse decomposition process without affecting the image perceptibility. First, the cover image is decomposed by the orthogonal matching pursuit algorithm of image sparse decomposition, and the shuffled frog leaping algorithm (SFLA) is used to select the optimal atom in each decomposition iteration. Then, different quantization bi
APA, Harvard, Vancouver, ISO, and other styles
7

Wibisono, Gunawan, Tri Waluyo, and Erik Iman Heri Ujianto. "KAJIAN METODE METODE STEGANOGRAFI PADA DOMAIN SPASIAL." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 5, no. 2 (2020): 259–64. http://dx.doi.org/10.33480/jitk.v5i2.1212.

Full text
Abstract:
This paper contains a review of the spatial domain steganographic literature. The purpose of this paper is to provide knowledge about techniques or methods that exist in the spatial domain of steganography. Steganography is the science or technique for hiding secret messages in other messages so that the existence of the secret message cannot be accessed by others who do not have authority. There are several popular spatial domains of steganographic techniques, namely LSB (Least Significant Bit), which is mapping secret message bits in the rightmost bit (LSB) of each color pixel and PVD (Pixel
APA, Harvard, Vancouver, ISO, and other styles
8

SALLEE, PHIL. "MODEL-BASED METHODS FOR STEGANOGRAPHY AND STEGANALYSIS." International Journal of Image and Graphics 05, no. 01 (2005): 167–89. http://dx.doi.org/10.1142/s0219467805001719.

Full text
Abstract:
This paper presents methods for performing steganography and steganalysis using a statistical model of the cover medium. The methodology is general, and can be applied to virtually any type of media. It provides answers for some fundamental questions that have not been fully addressed by previous steganographic methods, such as how large a message can be hidden without risking detection by certain statistical methods, and how to achieve this maximum capacity. Current steganographic methods have been shown to be insecure against simple statistical attacks. Using the model-based methodology, an
APA, Harvard, Vancouver, ISO, and other styles
9

Wu, Han-Yan, Ling-Hwei Chen, and Yu-Tai Ching. "Block-Based Steganography Method Using Optimal Selection to Reach High Efficiency and Capacity for Palette Images." Applied Sciences 10, no. 21 (2020): 7820. http://dx.doi.org/10.3390/app10217820.

Full text
Abstract:
The primary goal of steganographic methods is to develop statically undetectable methods with high steganographic capacity. The embedding efficiency is one kind of measure for undetectability. Block-based steganography methods have been proposed for achieving higher embedding efficiency under limited embedding capacity. However, in these methods, some blocks with larger embedding distortions are skipped, and a location map is usually incorporated into these methods to record the embedding status of each block. This reduces the embedding capacity for secret messages. In this study, we proposed
APA, Harvard, Vancouver, ISO, and other styles
10

Zulfikar, Dian Hafidh, and Agus Harjoko. "Perbandingan Kapasitas Pesan pada Steganografi DCT Sekuensial dan Steganografi DCT F5 dengan Penerapan Point Operation Image Enhancement." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 10, no. 1 (2016): 35. http://dx.doi.org/10.22146/ijccs.11187.

Full text
Abstract:
Steganographic process on the DCT transform is generally done on the value of DCT quantization process results that have a value other than 0, this relates to the distribution of the diversity of pixels in the image. Applying point operation of image enhancement (POIE) in the form of histogram equalization, contrast stretching, brigthening and gamma correction on the image of the reservoir is associated with the image histogram . Test parameters used is the number of bits that can be accommodated message, PSNR and MSE value, and the value of DCT coefficients quantization results. Based on test
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Steganographic capacity"

1

Almohammad, Adel. "Steganography-based secret and reliable communications : improving steganographic capacity and imperceptibility." Thesis, Brunel University, 2010. http://bura.brunel.ac.uk/handle/2438/4634.

Full text
Abstract:
Unlike encryption, steganography hides the very existence of secret information rather than hiding its meaning only. Image based steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. Related to this, we also investigate h
APA, Harvard, Vancouver, ISO, and other styles
2

Carrara, Brent. "Air-Gap Covert Channels." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35103.

Full text
Abstract:
A fresh perspective on covert channels is presented in this work. A new class, air-gap covert channels, is defined as an unintentional communication channel established between systems that are physically and electronically isolated from one another. A specific class of air-gap covert channel is studied in depth, out-of-band covert channels (OOB-CCs), which are defined as policy-breaking communication channels established between isolated, physically unmodified systems. It is shown that OOB-CCs can be categorized by the physical channel that they communicate over: acoustic, light, seismic, mag
APA, Harvard, Vancouver, ISO, and other styles
3

Koppola, Rajanikanth Reddy. "A High Capacity Data-Hiding Scheme in LSB-Based Image Steganography." University of Akron / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=akron1236708072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chung, Cheng-Yen, and 鍾成彥. "A Study on High Capacity Steganographic Scheme." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/61181414472521084805.

Full text
Abstract:
碩士<br>清雲科技大學<br>電子工程系所<br>97<br>In this thesis, we propose two high embedding capacity steganographic methods for images. The first is a high capacity steganographic scheme integrating TPVD(Tri-way Pixel Value Difference) and modulus function. The second is a digital image steganographic method for secret data authentication. There are two main issues in steganographic schemes: the hidden capacity and the quality of the stego-image. In general, a high capacity embedding scheme will produce a low quality stego-image. In this thesis, we try to keep the stego-image in high quality while affording
APA, Harvard, Vancouver, ISO, and other styles
5

Zawilska, Anna. "Quantifying steganographic embedding capacity in DCT-based embedding schemes." Thesis, 2012. http://hdl.handle.net/10413/8975.

Full text
Abstract:
Digital image steganography has been made relevant by the rapid increase in media sharing over the Internet and has thus experienced a renaissance. This dissertation starts with a discussion of the role of modern digital image steganography and cell-based digital image stego-systems which are the focus of this work. Of particular interest is the fact that cell-based stego-systems have good security properties but relatively poor embedding capacity. The main research problem is stated as the development of an approach to improve embedding capacity in cell-based systems. The dissertation then tr
APA, Harvard, Vancouver, ISO, and other styles
6

Yuan-Yu, Tsai. "Efficient and High-Capacity Steganographic Algorithms for Three-Dimensional Models." 2006. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0005-2008200622482600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lai, Wei-Ju, and 賴威儒. "A High-Capacity Steganographic System Using MRF-Based Texture Synthesis." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/68202672985585367660.

Full text
Abstract:
碩士<br>國立清華大學<br>資訊工程學系<br>101<br>Steganography is a theory of information hiding. It prevents secret message from being stolen and destroyed during communication. This thesis proposes a high-capacity steganographic system for data hiding. We adopt a texture synthesis algorithm based on Markov Random Field (MRF) model [Chen2003] to synthesize cover images with user-selected size. Generally, the length of a secret message to be hidden is limited by the size of the cover image; we solved this problem by using the texture synthesis algorithm. In addition, to enhance the security, we encrypt the se
APA, Harvard, Vancouver, ISO, and other styles
8

Tsai, Yuan-Yu, and 蔡淵裕. "Efficient and High-Capacity Steganographic Algorithms for Three-Dimensional Models." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/92623255851411467070.

Full text
Abstract:
博士<br>國立中興大學<br>資訊科學系所<br>94<br>Nowadays, the use of three-dimensional models in information hiding techniques is gradually attracting more and more attention. Watermarking algorithms, which mainly protect copyright ownership, are still in the majority. For steganographic algorithms, which are mainly techniques of covert communication, only a few papers have been presented, and there is still much room for development. In terms of efficiency, current steganographic algorithms use complicated operations or data structures during the embedding and extracting algorithms. This may greatly increase
APA, Harvard, Vancouver, ISO, and other styles
9

Yu, Cheng-Wei, and 游政偉. "Ultrahigh Capacity 3D Steganographic Algorithm in Spatial and Data Format Domains." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/45003852557358387814.

Full text
Abstract:
碩士<br>國立成功大學<br>資訊工程學系碩博士班<br>95<br>Transmitting digital media over networks has become very convenient and popular in recent years. Therefore, information hiding in multimedia has drawn a lot of attention and has become an important research issue. A message is hidden in digital media such as images, videos, audios, documents or 3D polygon models in an imperceptible manner. This is done so as not to impede host media use, while information hiding can be helpful for various interesting applications such as covert communications and watermarking for ownership authentication and content protecti
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Chung-Yuan, and 王重元. "A High Capacity and Imperceptibility Reversible Data Hiding Scheme Using Dual Steganographic Images." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/89271800147724228449.

Full text
Abstract:
碩士<br>逢甲大學<br>通訊工程學系<br>103<br>Data hiding technique is mainly embedding the secret messages using a meaningful media as a cover, that other people cannot detect the existence of the secret messages. Reversible data hiding scheme is meaning that receiver can reduced steganographic media to original cover media after extracting the secret messages from steganographic media. The technology of reversible data hiding has many typical applications, such as related fields of medical and military. Up to now the largest capacity(means the largest capacity of the image quality more than 30 dB) of rever
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Steganographic capacity"

1

Islam, Saiful, Ekram Khan, and Phalguni Gupta. "Enhanced Steganographic Capacity Using Morphing Technique." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31837-5_60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Ting, Yao Zhao, Rongrong Ni, and Lifang Yu. "A High Capacity Steganographic Algorithm in Color Images." In Digital Watermarking. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04438-0_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zou, Jiajun, Zhongliang Yang, Siyu Zhang, Sadaqat ur Rehman, and Yongfeng Huang. "High-Performance Linguistic Steganalysis, Capacity Estimation and Steganographic Positioning." In Digital Forensics and Watermarking. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69449-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kuo, Wen-Chung, Yi-Heng Chen, and Yu-Chih Huang. "High-Capacity Steganographic Method Based on Division Arithmetic and LSB Replacement." In Lecture Notes in Electrical Engineering. Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-5083-8_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chang, Chin-Chen, Chih-Yang Lin, and Yu-Zheng Wang. "VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11553939_148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dong, Yi, Tanfeng Sun, and Xinghao Jiang. "A High Capacity HEVC Steganographic Algorithm Using Intra Prediction Modes in Multi-sized Prediction Blocks." In Digital Forensics and Watermarking. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11389-6_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Ching-Yu, and Wen-Fong Wang. "High-Capacity ECG Steganography with Smart Offset Coefficients." In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-63856-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nozaki, Koichi, Michiharu Niimi, and Eiji Kawaguchi. "A large capacity steganography using color BMP images." In Computer Vision — ACCV'98. Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63930-6_111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Filler, Tomáš, and Jessica Fridrich. "Fisher Information Determines Capacity of ε-Secure Steganography." In Information Hiding. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04431-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ho, Sheng-Chih, Chung-Yi Lin, and Chao-Lung Chou. "Capacity on Demand Steganography Through Adaptive Threshold Strategy." In Security with Intelligent Computing and Big-data Services. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-76451-1_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Steganographic capacity"

1

Harmsen, Jeremiah J., and William A. Pearlman. "Capacity of steganographic channels." In the 7th workshop. ACM Press, 2005. http://dx.doi.org/10.1145/1073170.1073175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Евсютин, Олег, Oleg Evsutin, Анна Мельман, et al. "A New Approach to Reducing the Distortion of the Digital Image Natural Model in the DCT Domain When Embedding Information According to the QIM Method." In 29th International Conference on Computer Graphics, Image Processing and Computer Vision, Visualization Systems and the Virtual Environment GraphiCon'2019. Bryansk State Technical University, 2019. http://dx.doi.org/10.30987/graphicon-2019-2-268-272.

Full text
Abstract:
One of the areas of digital image processing is the steganographic embedding of additional information into them. Digital steganography methods are used to ensure the information confidentiality, as well as to track the distribution of digital content on the Internet. Main indicators of the steganographic embedding effectiveness are invisibility to the human eye, characterized by the PSNR metric, and embedding capacity. However, even with full visual stealth of embedding, its presence may produce a distortion of the digital image natural model in the frequency domain. The article presents a ne
APA, Harvard, Vancouver, ISO, and other styles
3

Agaian, Sos S., and Ronnie R. Sifuentes. "Adaptive steganography with increased embedding capacity for new generation of steganographic systems." In Electronic Imaging 2005, edited by Edward R. Dougherty, Jaakko T. Astola, and Karen O. Egiazarian. SPIE, 2005. http://dx.doi.org/10.1117/12.588032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ker, Andrew D., Tomáš Pevný, Jan Kodovský, and Jessica Fridrich. "The square root law of steganographic capacity." In the 10th ACM workshop. ACM Press, 2008. http://dx.doi.org/10.1145/1411328.1411349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Almohammad, Adel, Robert M. Hierons, and Gheorghita Ghinea. "High Capacity Steganographic Method Based Upon JPEG." In 2008 Third International Conference on Availability, Reliability and Security. IEEE, 2008. http://dx.doi.org/10.1109/ares.2008.72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Carrara, Brent, and Carlisle Adams. "Estimating the steganographic capacity of band-limited channels." In 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2016. http://dx.doi.org/10.1109/ccece.2016.7726723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chung, Yuk. "A Study of High Capacity Image Steganographic System." In TENCON 2005 - 2005 IEEE Region 10 Conference. IEEE, 2005. http://dx.doi.org/10.1109/tencon.2005.301183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sarkar, Anindya, Kenneth Sullivan, and B. S. Manjunath. "Steganographic capacity estimation for the statistical restoration framework." In Electronic Imaging 2008, edited by Edward J. Delp III, Ping Wah Wong, Jana Dittmann, and Nasir D. Memon. SPIE, 2008. http://dx.doi.org/10.1117/12.767841.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Agaian, Sos S., and Benjamin M. Rodriguez. "Practical steganographic capacity and the best cover image." In Defense and Security, edited by Zia-ur Rahman, Robert A. Schowengerdt, and Stephen E. Reichenbach. SPIE, 2005. http://dx.doi.org/10.1117/12.604004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ke, Qi, Xie Dong-qing, and Zhang Da-fang. "An Adaptive High-Capacity Steganographic Algorithm for 3D Models." In 2009 International Conference on Information Technology and Computer Science (ITCS 2009). IEEE, 2009. http://dx.doi.org/10.1109/itcs.2009.261.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Steganographic capacity"

1

Moskowitz, Ira S., Patricia A. Lafferty, and Farid Ahmed. On LSB Spatial Domain Steganography and Channel Capacity. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada489843.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!