[PDF][PDF] Image steganography in spatial domain: Current status, techniques, and trends.

AM Alhomoud - Intelligent Automation & Soft Computing, 2021 - cdn.techscience.cn
This research article provides an up-to-date review of spatial-domain steganography.
Maintaining the communication as secure as possible when transmitting secret data through …

[图书][B] Introductory computer forensics

X Lin, X Lin, Lagerstrom-Fife - 2018 - Springer
Internet technology is advancing at a speed beyond comprehension. With everadvancing
Internet technology, we truly are living in a digital age. It will certainly improve our quality of …

Smart anti-theft door locking system

S Jahnavi, C Nandini - 2019 1st International Conference on …, 2019 - ieeexplore.ieee.org
Privacy and security are two pivotal rights in day-to-day life. At present, keys, passwords and
PIN's are used to secure the confidential data. However the above mentioned methods can …

Novel multifold secured system by combining multimodal mask steganography and naive based random visual cryptography system for digital communication

S Jahnavi, C Nandini - Journal of computational and theoretical …, 2020 - ingentaconnect.com
With increase in growth of data and digital threat, demand of securing the data
communicated over the internet is an essential play in the digital world. In the vision of …

[PDF][PDF] A Proposal to Improve the Bit Plane Steganography based on the Complexity Calculation Technique

C Do Xuan - … Journal of Advanced Computer Science and …, 2021 - pdfs.semanticscholar.org
The video steganography technique is being studied and applied a lot today because of its
benefits. In particular, the video steganography technique using Bit-Plane Complexity …

LSB Steganography to Embed Creator's Watermark in Batik Digital Arts

MM Amri, M Waeno, MZ Musa - Engineering Science Letter, 2023 - journal.iistr.org
This paper presents an implementation of Least Significant Bit (LSB) steganography to
embed a hidden watermark in batik digital images. The goal of the technique is to provide a …

A steganographic approach to mitigate password attacks

I Pandya, S Jhajj, R Pawar - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
With the advancement in cyber security, attacks on passwords are also becoming advanced
and industrial espionage poses one of the greatest danger to business these days. Critical …

Kriptoloji ve Steganografiyle Güvenli İletişim Sistemi Tasarımı

H Buhurcu - 2022 - acikerisim.selcuk.edu.tr
Özet Bilgi ve iletişim güvenliği, verilere yetkisiz kişiler tarafından erişimi engelleme yollarının
tümü olarak ifade edilebilir ve bu amaca ulaşmak için kriptoloji ve steganografi bilimleri …

Web güvenlik dahilinde steganografi kullanımı ve kullanıcı giriş sisteminde uygulanması

T Valibayli - acikbilim.yok.gov.tr
Steganografinin önemli amacı, gizli bilgiyi, yetkisi olmayan kişilerin görmesi durumunda,
bilginin gizlendiği alan dahilinde bilginin saklandığına dair şüpheleri ortadan kaldırmaktır …

Steganography and steganalysis

X Lin, X Lin - Introductory Computer Forensics: A Hands-on Practical …, 2018 - Springer
Steganography and Steganalysis | SpringerLink Skip to main content Advertisement
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …