1,960 resources related to Steganography
- Conferences related to Steganography
- Xplore Articles related to Steganography
- Jobs related to Steganography
- Educational Resources on Steganography
2013 IEEE International Conference on Systems\, Man and Cybernetics - SMCVisit website
SMC 2013 targets advances in Systems Science and Engineering Human-machine Systems and Cybernetics involving state-of-the-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories\, methodologies and emerging applications.
2012 Third International Conference on Computing\, Communication and Networking Technologies (ICCCNT'12)Visit website
The purpose of ICCCNT 2012 is to bring together researchers from the computing\, communication and networking communities to present ground-breaking research and debate key issues of common interest. International experts will share their vision\, extensive experience and knowledge gained through modeling\, lab and field trials and will discuss the applications of a variety of technologies world wide. It also provides ideal opportunities for consolidating and establishing collaborations at the international l
2011 4th IEEE International Conference on Computer Science and Information Technology (ICCSIT 2011)Visit website
The conference is an international forum for the presentation of technological advances and research results in the fields of Computer Science and Information Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world.
2011 IEEE 14th International Multitopic Conference (INMIC)
Artificial Itelligence\, Control Systems and Mechatronics\, Computer Networks and Security\, Virtualization and Cloud Computing\, Databases and Warehousing Multimedia\, Computer Graphics and Image Processing\, Bio-informatics Power Systems and Alternate Energy Resources\, Software Engineering Wireless\, Mobile and Sensor Networks\, E-Government & E-Commerce\, E-Learning\, Semantic Web Technologies\, Pervasive Ubiquitous Computing.
2010 2nd International Conference on Advanced Computer Control (ICACC)Visit website
The aim objective of ICACC 2010 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in the fields of Advanced Computer Control, Automation, Database System, Communication Systems, and Applied Computer Science.
Yongzhen Zheng; Fenlin Liu; Xiangyang Luo; Chunfang Yang Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on, 2012
Reliable identification of steganography software is an important research direction of steganography forensics, how to identify the steganography software based on the characteristics of steganography algorithm is the difficulty in the research of identifying the steganography software. In this paper, based on the principles of LSB Steganography algorithm (include LSB Replacement and LSB Matching), we propose an approach to identify ...
Yongzhen Zheng; Fenlin Liu; Chunfang Yang; Xiangyang Luo; Kun Zhao Multimedia Information Networking and Security (MINES), 2011 Third International Conference on, 2011
In this paper, based on the principles of LSB Replacement Steganography algorithm, we propose an approach to identify steganography software by Core Instructions Template Matching. First, we take the process of operations to the pixels in the LSB Replacement steganography algorithm as Core Instructions, and we have analyzed the implementation of Core Instructions in a variety of typical steganography software ...
Hamdaqa, M.; Tahvildari, L. Secure Software Integration and Reliability Improvement (SSIRI), 2011 Fifth International Conference on, 2011
VoIP steganography is a real-time network steganography, which utilizes VoIP protocols and traffic as a covert channel to conceal secret messages. Recently, there has been a noticeable increase in the interest in VoIP steganography due to the volume of VoIP traffic generated, which proved to be economically feasible to utilize. This paper discusses VoIP steganography challenges, compares the existing mechanisms, ...
Mei-Ching Chen; Roy, A.; Rodriguez, B.M.; Agaian, S.S.; Chen, C.L.P. Systems, Man and Cybernetics, 2009. SMC 2009. IEEE International Conference on, 2009
Current technology allows steganography applications to conceal any digital file inside of another digital file. Due to the large number of steganography tools available over the Internet, a particular threat exists when criminals use steganography to conceal their activities within digital images in cyber space. In this paper, a set of statistical features are generated using linear mixed effects models ...
Mohd, B.J.; Abed, S.; Al-Hayajneh, T.; Alouneh, S. Computer, Information and Telecommunication Systems (CITS), 2012 International Conference on, 2012
Steganography is one of the most powerful techniques to conceal the existence of hidden secret data inside a cover object. Images are the most popular cover objects for steganography, and thus the importance of image steganography. Embedding secret information inside images requires intensive computations, and therefore, designing steganography in hardware speeds up steganography. This work presents a hardware design of ...
No jobs are currently tagged "Steganography"
No education resources are currently tagged "Steganography"
No standards are currently tagged "Steganography"
IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...