[引用][C] Image Steganography

R Joshi, L Gagnani, S Pandey - Int. J. Latest Engineering. Mangement Reaserch, 2013

A review of steganography techniques

AM Khalaf, K Lakhtaria - AIP Conference Proceedings, 2024 - pubs.aip.org
Due to the importance, security, confidentiality, privacy, and progress of information at
present due to the development in the field of information technology, sharing this …

[PDF][PDF] A study of text steganography methods

FC Akbar, TW Purboyo, R Latuconsina - J. Eng. Appl. Sci, 2019 - academia.edu
Based on the development of information and communication technology, then the security
improvement will be more important. One of them is the level of security in inserting data or …

Data security using steganography

AK Babando, BM Ahmad - LC International Journal of STEM (ISSN …, 2022 - lcjstem.com
Steganography is a fascinating topic that is unique from the everyday cryptography and
system administration that most of us deal with. Steganography is a type of code that can be …

Image steganography, a new approach for transferring security information

HB Bahar, A Aboutalebi - arXiv preprint arXiv:0808.1410, 2008 - arxiv.org
Steganography is the art of hiding the fact that communication is taking place, by hiding
information in other information. Many different carrier file formats can be used, but digital …

[PDF][PDF] Overview of digital steganography methods and its applications

V Nagaraj, V Vijayalakshmi, G Zayaraz - Int. J. Adv. Sci. Technol, 2013 - academia.edu
Steganography is the skill of communicating secret data by embedding it into multimedia
carriers like image, audio, videos. The ultimate goal here is to mask the very existence of the …

[PDF][PDF] A Comprehensive Analysis Of Image Steganography And Its Techniques

I Khalid, M Naeem, A Shahzad, MI Khan… - … (ISSN: 1735-188X), 2021 - researchgate.net
The advancement in technology needs secure system because it is really important to
protect personal data from third party attacks. The more the technology develop it increases …

[PDF][PDF] A Novel Algorithm Based Design Scheme for Embedding Secret Message onto a Steganographic Channel

V Bharti, H Bedi - International Journal of Electronics Engineering …, 2008 - csjournals.com
Security is more about process than technology. A first step for a corporation in managing
security is to consider where the security is mostly required. The majority of attacks today are …

[引用][C] Steganography: Exploring an ancient art of Hiding Information from Past to the Future

G Borse, V Anand, K Patel - International Journal of Engineering and Innovative …, 2013

[PDF][PDF] Analysis of different steganographic algorithms for secured data hiding

M Umamaheswari, S Sivasubramanian… - … International Journal of …, 2010 - academia.edu
The goal of steganography is to avoid drawing suspicion to the transmission of a hidden
message. If suspicion is raised, steganography may fail. The success of steganography …