Steganography

View this topic in
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. (Wikipedia.org)






Conferences related to Steganography

Back to Top

2014 IEEE International Conference on Systems, Man and Cybernetics - SMC

SMC2014 targets advances in Systems Science and Engineering, Human-Machine Systems, and Cybernetics involving state-of-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies, and emerging applications.

  • 2013 IEEE International Conference on Systems, Man and Cybernetics - SMC

    SMC 2013 targets advances in Systems Science and Engineering Human-machine Systems and Cybernetics involving state-of-the-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies and emerging applications.

  • 2012 IEEE International Conference on Systems, Man and Cybernetics - SMC

    Theory, research and technology advances including applications in all aspects of systems science and engineering, human machine systems, and emerging cybernetics.

  • 2011 IEEE International Conference on Systems, Man and Cybernetics - SMC

    Theory, research, and technology advances including applications in all aspects of systems science and engineering, human machine systems, and emerging cybernetics.

  • 2010 IEEE International Conference on Systems, Man and Cybernetics - SMC

    The 2010 IEEE International Conference on Systems, Man, and Cybernetics (SMC2010) provides an international forum that brings together those actively involved in areas of interest to the IEEE Systems, Man, and Cybernetics Society, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics.

  • 2009 IEEE International Conference on Systems, Man and Cybernetics - SMC

    The 2009 IEEE International Conference on Systems, Man, and Cybernetics (SMC2009) provides an international forum that brings together those actively involved in areas of interest to the IEEE Systems, Man, and Cybernetics Society, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics.

  • 2008 IEEE International Conference on Systems, Man and Cybernetics - SMC


2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)

The scope of the Conference includes include, but are certainly not limited to the following:Mobile computingGrid / Cloud / Parallel ComputingOptical / Quantum ComputingSoft ComputingPattern RecognitionSignal / Image ProcessingBiometrics / Biomedical EngineeringMobile CommunicationBroadband CommunicationWireless CommunicationOptical CommunicationRF ElectronicsElectronics Devices / SystemsVLSI / Embedded SystemsMEMS/NEMSNanotechnologyPhotonic / Opto-electronic Structures / DevicesOptical NetworksMobile / Sensor / Ad-hoc NetworksInternet/Multimedia NetworksNetwork Security / Cryptography

  • 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)

    The purpose of ICCCNT 2012 is to bring together researchers from the computing, communication and networking communities to present ground-breaking research and debate key issues of common interest. International experts will share their vision, extensive experience and knowledge gained through modeling, lab and field trials and will discuss the applications of a variety of technologies world wide. It also provides ideal opportunities for consolidating and establishing collaborations at the international level.

  • 2010 International Conference on Computing, Communication and Networking Technologies (ICCCNT'10)

    The second International Conference on Computing, Communication and Networking Technologies (ICCCNT 10) will be held at the Chettinad College of Engineering and Technology (CCET), Karur (DT), TamilNadu, India from July 29th to 31st 2010. The CCET is promoted by a reputed 75 year old Group of Educational Institutions Chettinad House . The purpose of ICCCNT 10, is to bring together researchers from the computing, communication and networking communities to present ground-breaking research and debate key


2012 15th International Multitopic Conference (INMIC)

Conference scope revolves around activities such as Tutorials, Invited Talks, Research Papers, Workshops and Posters which will be held in academic disciplines that including Computer Science, Software Engineering, Information System, Information Technology, Electronics and Computer Engineering.

  • 2011 IEEE 14th International Multitopic Conference (INMIC)

    Artificial Itelligence, Control Systems and Mechatronics, Computer Networks and Security, Virtualization and Cloud Computing, Databases and Warehousing Multimedia, Computer Graphics and Image Processing, Bio-informatics Power Systems and Alternate Energy Resources, Software Engineering Wireless, Mobile and Sensor Networks, E-Government & E-Commerce, E-Learning, Semantic Web Technologies, Pervasive Ubiquitous Computing.

  • 2009 IEEE 13th International Multitopic Conference (INMIC)

    IEEE INMIC is held every year and INMIC 2009 will be the 13th in the series. INMIC has become Pakistan s flagship technical conference with a broad scope, thereby inviting interest of a large audience. The conference targets research presentations by academic and professional researchers, and also includes a series of tutorials, enabling participants to learn about the latest trends in technology. Research contributions are expected from the participants, covering various disciplines under IEEE s domain, in

  • 2008 International Multitopic Conference (INMIC)

    Communication Systems & Techniques Laser and Fiber Optics Wireless & Mobile Communication Systems Theoretical and Applied Information Technology Digital Signal Processing Distributed and Grid Computing Image Processing & Recognition Algorithms, Tools & Applications Photonics & Opto-Electronics Artificial Intelligence Embedded Systems and VLSI Broadband Networks Nano Technologies Computer Graphics Biomedical Engineering Control and Automation Power Electronics Soft Computing Satelli

  • 2007 IEEE International Multitopic Conference (INMIC)

    The IEEE International Multi-topic Conference INMIC has emerged as a leading forum in Pakistan for engineering professionals and researchers to dis-cuss and present the latest research trends and re-sults in the field of Science & Technology. INMIC 2007 promises to be an exciting event that will host leading Electrical Engineering researchers from across the globe and will provide opportunity to build international research collaborations.


2011 4th IEEE International Conference on Computer Science and Information Technology (ICCSIT 2011)

The conference is an international forum for the presentation of technological advances and research results in the fields of Computer Science and Information Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world.


2010 2nd International Conference on Advanced Computer Control (ICACC)

The aim objective of ICACC 2010 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in the fields of Advanced Computer Control, Automation, Database System, Communication Systems, and Applied Computer Science.


More Conferences

Periodicals related to Steganography

Back to Top

Internet Computing, IEEE

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...




Xplore Articles related to Steganography

Back to Top

Data hiding in video

Chae, J.J.; Manjunath, B.S. Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on, 1999

We propose a video data embedding scheme in which the embedded signature data is reconstructed without knowing the original host video. The proposed method enables a high rate of data embedding and is robust to motion compensated coding, such as MPEG-2. Embedding is based on texture masking and utilizes a multi-dimensional lattice structure for encoding signature information. Signature data is ...


Steganalysis Based on Weighted Stego-Image for 2LSB Replacement Steganography

Mao Ye; Fenlin Liu; Chunfang Yang; Xiongfei He Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP '09. Fifth International Conference on, 2009

The replacement steganography in each bit plane of two least-significant bits (2LSB) in digital images may be independent and the secret message length in each bit plane can be different. Based on the principle of the weighted stego- image, a new weighted stego-image model for 2LSB replacement steganography is given in this paper, and a new steganalytic method is based ...


A new steganographic method resisting statistical attack

Xiangwei Kong; Chang Liu; Xingang You; Yanqing Guo Signal Processing, 2004. Proceedings. ICSP '04. 2004 7th International Conference on, 2004

In this paper we present a new steganographic method for JPEG images that can resist both chi-square attack and Fridrich's "Breaking the F5" statistical attack. A key element in our method is a compensatory strategy that keeps the first-order statistical property of DCT coefficients in the stego-image almost identical with that in the cover-image, thus the statistical attacks are defeated. ...


Hiding Informationin in Java Class File

Daofu Gong; Fenlin Liu; Bin Lu; Ping Wang; Lan Ding Computer Science and Computational Technology, 2008. ISCSCT '08. International Symposium on, 2008

A novel steganographic scheme is proposed in this paper to embed secret message into Java executable files. It analyzes firstly the format of Java class file, and then reorder the indexes of constants to embed messages. Expensive experiments show that the stego file modified by the proposed scheme still have the same file size and the implementation performance as cover. ...


Research on Steganalysis for Text Steganography Based on Font Format

Lingyun Xiang; Xingming Sun; Gang Luo; Can Gan Information Assurance and Security, 2007. IAS 2007. Third International Symposium on, 2007

In the research area of text steganography, algorithms based on font format have advantages of great capacity, good imperceptibility and wide application range. However, little work on steganalysis for such algorithms has been reported in the literature. Based on the fact that the statistic features of font format will be changed after using font-format-based steganographic algorithms, we present a novel ...


More Xplore Articles

Educational Resources on Steganography

Back to Top

eLearning

Data hiding in video

Chae, J.J.; Manjunath, B.S. Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on, 1999

We propose a video data embedding scheme in which the embedded signature data is reconstructed without knowing the original host video. The proposed method enables a high rate of data embedding and is robust to motion compensated coding, such as MPEG-2. Embedding is based on texture masking and utilizes a multi-dimensional lattice structure for encoding signature information. Signature data is ...


Steganalysis Based on Weighted Stego-Image for 2LSB Replacement Steganography

Mao Ye; Fenlin Liu; Chunfang Yang; Xiongfei He Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP '09. Fifth International Conference on, 2009

The replacement steganography in each bit plane of two least-significant bits (2LSB) in digital images may be independent and the secret message length in each bit plane can be different. Based on the principle of the weighted stego- image, a new weighted stego-image model for 2LSB replacement steganography is given in this paper, and a new steganalytic method is based ...


A new steganographic method resisting statistical attack

Xiangwei Kong; Chang Liu; Xingang You; Yanqing Guo Signal Processing, 2004. Proceedings. ICSP '04. 2004 7th International Conference on, 2004

In this paper we present a new steganographic method for JPEG images that can resist both chi-square attack and Fridrich's "Breaking the F5" statistical attack. A key element in our method is a compensatory strategy that keeps the first-order statistical property of DCT coefficients in the stego-image almost identical with that in the cover-image, thus the statistical attacks are defeated. ...


Hiding Informationin in Java Class File

Daofu Gong; Fenlin Liu; Bin Lu; Ping Wang; Lan Ding Computer Science and Computational Technology, 2008. ISCSCT '08. International Symposium on, 2008

A novel steganographic scheme is proposed in this paper to embed secret message into Java executable files. It analyzes firstly the format of Java class file, and then reorder the indexes of constants to embed messages. Expensive experiments show that the stego file modified by the proposed scheme still have the same file size and the implementation performance as cover. ...


Research on Steganalysis for Text Steganography Based on Font Format

Lingyun Xiang; Xingming Sun; Gang Luo; Can Gan Information Assurance and Security, 2007. IAS 2007. Third International Symposium on, 2007

In the research area of text steganography, algorithms based on font format have advantages of great capacity, good imperceptibility and wide application range. However, little work on steganalysis for such algorithms has been reported in the literature. Based on the fact that the statistic features of font format will be changed after using font-format-based steganographic algorithms, we present a novel ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Steganography"

IEEE-USA E-Books

No IEEE-USA E-Books are currently tagged "Steganography"



Standards related to Steganography

Back to Top

No standards are currently tagged "Steganography"


Jobs related to Steganography

Back to Top