ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Information Hiding in Still Image Based on Variable Steganography Technique to Achieve High Imperceptibility
Mapping Intimacies
◽
10.1109/icsgrc53186.2021.9515235
◽
2021
◽
Author(s):
Rakan Mohammed Rashid
◽
Baker Khalid Baker
◽
Omar Farook Mohammad
◽
Falah Y H Ahmed
Keyword(s):
Information Hiding
◽
Still Image
Download Full-text
Related Documents
Cited By
References
Information hiding technique in most significant bit of still image
2009 International Conference on Image Analysis and Signal Processing
◽
10.1109/iasp.2009.5054594
◽
2009
◽
Cited By ~ 2
Author(s):
Fu Bing
◽
Zhou Xiansan
Keyword(s):
Information Hiding
◽
Still Image
Download Full-text
Using LSB Steganography Technique and 256 bits Key Length AES Algorithm for High Secured Information Hiding
International Journal of Advanced Research in Computer Science and Software Engineering
◽
10.23956/ijarcsse/sv7i5/0210
◽
2017
◽
Vol 7
(5)
◽
pp. 674-681
Author(s):
Eric Gyamfi
◽
◽
Isaac Kofi Nti
◽
Justice Aning
◽
◽
...
Keyword(s):
Information Hiding
◽
Aes Algorithm
◽
Key Length
Download Full-text
A novel video information hiding scheme with compressed sensing data
Computer Science and Systems Engineering
◽
10.2495/csse140261
◽
2015
◽
Author(s):
H. M. Zhao
◽
Y. M. Fang
Keyword(s):
Compressed Sensing
◽
Information Hiding
◽
Sensing Data
◽
Video Information
Download Full-text
Lossless information hiding scheme for two-dimensional CAD engineering graphics based on coordinate modification
Management Innovation and Information Technology
◽
10.2495/miit130921
◽
2014
◽
Author(s):
Zhengqiao Lei
Keyword(s):
Information Hiding
◽
Two Dimensional
◽
Engineering Graphics
Download Full-text
Estimation of Information Hiding Algorithms and Parameters
10.21236/ada464991
◽
2007
◽
Author(s):
Scott A. Craver
Keyword(s):
Information Hiding
Download Full-text
Information Hiding based Trusted Computing System Design
10.21236/ada608967
◽
2014
◽
Author(s):
Gang Qu
◽
Min Wu
Keyword(s):
System Design
◽
Information Hiding
◽
Trusted Computing
◽
Computing System
Download Full-text
Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its Detection
Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security
◽
10.1145/3369412.3395068
◽
2020
◽
Author(s):
Mario Hildebrandt
◽
Kevin Lamshöft
◽
Jana Dittmann
◽
Tom Neubert
◽
Claus Vielhauer
Keyword(s):
Supply Chain
◽
Control Systems
◽
Information Hiding
◽
Industrial Control
◽
Industrial Control Systems
Download Full-text
Coverless information hiding based on the generation of anime characters
EURASIP Journal on Image and Video Processing
◽
10.1186/s13640-020-00524-4
◽
2020
◽
Vol 2020
(1)
◽
Author(s):
Yi Cao
◽
Zhili Zhou
◽
Q. M. Jonathan Wu
◽
Chengsheng Yuan
◽
Xingming Sun
Keyword(s):
Information Hiding
◽
Coverless Information Hiding
Download Full-text
Ada information hiding - a design goal missing?
ACM SIGAda Ada Letters
◽
10.1145/9305.9307
◽
1986
◽
Vol VI
(3)
◽
pp. 43-55
Author(s):
W G Piotrowski
Keyword(s):
Information Hiding
◽
Design Goal
Download Full-text
Information hiding in images using Discrete Cosine Transform
IOP Conference Series Materials Science and Engineering
◽
10.1088/1757-899x/1098/5/052083
◽
2021
◽
Vol 1098
(5)
◽
pp. 052083
Author(s):
G Emmanuel
◽
G G Hungil
◽
J Maiga
◽
A J Santoso
Keyword(s):
Discrete Cosine Transform
◽
Information Hiding
◽
Cosine Transform
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close