[PDF][PDF] Image steganography techniques: an overview

N Hamid, A Yahya, RB Ahmad… - International Journal of …, 2012 - Citeseer
Steganography is one of the methods used for the hidden exchange of information and it
can be defined as the study of invisible communication that usually deals with the ways of …

Steganography in modern smartphones and mitigation techniques

W Mazurczyk, L Caviglione - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …

Steganography techniques

A Yahya, A Yahya - Steganography techniques for digital images, 2019 - Springer
This chapter reviews the main steganographic methods for both lossy and lossless image
formats, such as JPEG and BMP. The values are presented in terms of a taxonomy that …

Encryptgan: Image steganography with domain transform

Z Zheng, H Liu, Z Yu, H Zheng, Y Wu, Y Yang… - arXiv preprint arXiv …, 2019 - arxiv.org
We propose an image steganographic algorithm called EncryptGAN, which disguises
private image communication in an open communication channel. The insight is that content …

An Improved Intensity Factor of Correlation-Based Steganography Using M-Sequence and DCT

K Onuma, S Miyata - SN Computer Science, 2023 - Springer
It is important to securely send information through the Internet; thus, technologies for safely
exchanging information are required. One such technology is steganography, which …

[PDF][PDF] Enhancing the robustness of digital image steganography using ECC and redundancy

N Hamid, A Yahya, RB Ahmad, D Najim… - WULFENIA …, 2013 - researchgate.net
Steganography is a process of secret communication where a secret message is hidden in
such a way that the very existence of the secret information remains concealed. Any …

[PDF][PDF] Steganography in mobile phone over bluetooth

S Baker, A Nori - International Journal of Information Technology and …, 2013 - Citeseer
STEGANOGRAPHY IN MOBILE PHONE OVER BLUETOOTH Page 1 International Journal of
Information Technology and Business Management 29th August 2013. Vol.16 No.1 © 2012 …

Third Quarter 2013, IEEE Communications Surveys & Tutorials

E Hossain - IEEE Communications Surveys & Tutorials, 2013 - ieeexplore.ieee.org
This issue includes twenty five articles covering different aspects of communication
networks. In particular, issues related to energy efficient multimedia transmission …

An Enhanced Robust and Protected Image Steganographic System

A Yahya, A Yahya - Steganography Techniques for Digital Images, 2019 - Springer
This chapter deals with two main aspects; the first one is concerned with introducing an
improved robust and secure image steganography system. The original algorithm presented …

اخفاء المعلومات عبر الهاتف النقال باستخدام البلوتوث

سامي نوري, أحمد, عبد المنعم بكر… - المجلة العراقیة للعلوم …, 2013‎ - stats.mosuljournals.com
نظراً للتطور الهائل لوسائل الاتصال وتبادل المعلومات أصبحت الخصوصية الشخصية عرضة
للانتهاك بسهولة أكبر من ذي قبل, لهذا ظهرت الحاجة إلى اعتماد تقنية أكثر تطوراً وأكثر سريةً وحفاظا …