Steganography

View this topic in
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. (Wikipedia.org)






Conferences related to Steganography

Back to Top

2014 IEEE International Conference on Systems, Man and Cybernetics - SMC

SMC2014 targets advances in Systems Science and Engineering, Human-Machine Systems, and Cybernetics involving state-of-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies, and emerging applications.

  • 2013 IEEE International Conference on Systems, Man and Cybernetics - SMC

    SMC 2013 targets advances in Systems Science and Engineering Human-machine Systems and Cybernetics involving state-of-the-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies and emerging applications.

  • 2012 IEEE International Conference on Systems, Man and Cybernetics - SMC

    Theory, research and technology advances including applications in all aspects of systems science and engineering, human machine systems, and emerging cybernetics.

  • 2011 IEEE International Conference on Systems, Man and Cybernetics - SMC

    Theory, research, and technology advances including applications in all aspects of systems science and engineering, human machine systems, and emerging cybernetics.

  • 2010 IEEE International Conference on Systems, Man and Cybernetics - SMC

    The 2010 IEEE International Conference on Systems, Man, and Cybernetics (SMC2010) provides an international forum that brings together those actively involved in areas of interest to the IEEE Systems, Man, and Cybernetics Society, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics.

  • 2009 IEEE International Conference on Systems, Man and Cybernetics - SMC

    The 2009 IEEE International Conference on Systems, Man, and Cybernetics (SMC2009) provides an international forum that brings together those actively involved in areas of interest to the IEEE Systems, Man, and Cybernetics Society, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics.

  • 2008 IEEE International Conference on Systems, Man and Cybernetics - SMC


2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)

The scope of the Conference includes include, but are certainly not limited to the following:Mobile computingGrid / Cloud / Parallel ComputingOptical / Quantum ComputingSoft ComputingPattern RecognitionSignal / Image ProcessingBiometrics / Biomedical EngineeringMobile CommunicationBroadband CommunicationWireless CommunicationOptical CommunicationRF ElectronicsElectronics Devices / SystemsVLSI / Embedded SystemsMEMS/NEMSNanotechnologyPhotonic / Opto-electronic Structures / DevicesOptical NetworksMobile / Sensor / Ad-hoc NetworksInternet/Multimedia NetworksNetwork Security / Cryptography

  • 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)

    The purpose of ICCCNT 2012 is to bring together researchers from the computing, communication and networking communities to present ground-breaking research and debate key issues of common interest. International experts will share their vision, extensive experience and knowledge gained through modeling, lab and field trials and will discuss the applications of a variety of technologies world wide. It also provides ideal opportunities for consolidating and establishing collaborations at the international level.

  • 2010 International Conference on Computing, Communication and Networking Technologies (ICCCNT'10)

    The second International Conference on Computing, Communication and Networking Technologies (ICCCNT 10) will be held at the Chettinad College of Engineering and Technology (CCET), Karur (DT), TamilNadu, India from July 29th to 31st 2010. The CCET is promoted by a reputed 75 year old Group of Educational Institutions Chettinad House . The purpose of ICCCNT 10, is to bring together researchers from the computing, communication and networking communities to present ground-breaking research and debate key


2012 15th International Multitopic Conference (INMIC)

Conference scope revolves around activities such as Tutorials, Invited Talks, Research Papers, Workshops and Posters which will be held in academic disciplines that including Computer Science, Software Engineering, Information System, Information Technology, Electronics and Computer Engineering.

  • 2011 IEEE 14th International Multitopic Conference (INMIC)

    Artificial Itelligence, Control Systems and Mechatronics, Computer Networks and Security, Virtualization and Cloud Computing, Databases and Warehousing Multimedia, Computer Graphics and Image Processing, Bio-informatics Power Systems and Alternate Energy Resources, Software Engineering Wireless, Mobile and Sensor Networks, E-Government & E-Commerce, E-Learning, Semantic Web Technologies, Pervasive Ubiquitous Computing.

  • 2009 IEEE 13th International Multitopic Conference (INMIC)

    IEEE INMIC is held every year and INMIC 2009 will be the 13th in the series. INMIC has become Pakistan s flagship technical conference with a broad scope, thereby inviting interest of a large audience. The conference targets research presentations by academic and professional researchers, and also includes a series of tutorials, enabling participants to learn about the latest trends in technology. Research contributions are expected from the participants, covering various disciplines under IEEE s domain, in

  • 2008 International Multitopic Conference (INMIC)

    Communication Systems & Techniques Laser and Fiber Optics Wireless & Mobile Communication Systems Theoretical and Applied Information Technology Digital Signal Processing Distributed and Grid Computing Image Processing & Recognition Algorithms, Tools & Applications Photonics & Opto-Electronics Artificial Intelligence Embedded Systems and VLSI Broadband Networks Nano Technologies Computer Graphics Biomedical Engineering Control and Automation Power Electronics Soft Computing Satelli

  • 2007 IEEE International Multitopic Conference (INMIC)

    The IEEE International Multi-topic Conference INMIC has emerged as a leading forum in Pakistan for engineering professionals and researchers to dis-cuss and present the latest research trends and re-sults in the field of Science & Technology. INMIC 2007 promises to be an exciting event that will host leading Electrical Engineering researchers from across the globe and will provide opportunity to build international research collaborations.


2011 4th IEEE International Conference on Computer Science and Information Technology (ICCSIT 2011)

The conference is an international forum for the presentation of technological advances and research results in the fields of Computer Science and Information Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world.


2010 2nd International Conference on Advanced Computer Control (ICACC)

The aim objective of ICACC 2010 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in the fields of Advanced Computer Control, Automation, Database System, Communication Systems, and Applied Computer Science.


More Conferences

Periodicals related to Steganography

Back to Top

Internet Computing, IEEE

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...




Xplore Articles related to Steganography

Back to Top

High capacity image steganography using wavelet-based fusion

Tolba, M.F.; Ghonemy, M.A.-S.; Taha, I.A.-H.; Khalifa, A.S. Computers and Communications, 2004. Proceedings. ISCC 2004. Ninth International Symposium on, 2004

Digital steganography exploits the use of a host data to hide a piece of information in such a way that it is imperceptible to a human observer. This work presents a cover-screw algorithm based on what is called the wavelet based fusion. In this method the wavelet decomposition of both the cover image and the secret message are merged into ...


A Tree Based Recursive Information Hiding Scheme

Parakh, A.; Kak, S. Communications (ICC), 2010 IEEE International Conference on, 2010

This paper presents a k-out-of-n recursive information hiding scheme based on an n-ary tree data structure. In recursive hiding of information, the user encodes additional information in the shares of the secret, intended to be originally shared, without an expansion in the size of the latter. The proposed scheme has applications in secure distributed storage and information dispersal protocols. It ...


A wavelet-based blind JPEG image steganalysis using co-occurrence matrix

Han Zong; Fenlin Liu; Xiangyang Luo Advanced Communication Technology, 2009. ICACT 2009. 11th International Conference on, 2009

A new approach to blind detection of JPEG images having hiding information, which is based on the feature of wavelet domain is put forward. The specific way of detection is as follows: First, decompose an image by using wavelet, calculate the co-occurrence matrix of the adjacent wavelet coefficients, and apply Laplace transform to the co-occurrence matrix. Then take the Laplace- ...


Polynomial complexity optimal detection of certain multiple-access systems

Schlegel, C.; Grant, A. Information Theory, IEEE Transactions on, 2000

It is demonstrated that optimal multiple-user detection in a linear multiple- access system with identical crosscorrelations requires only 𝒪(KlogK) operations instead of the worst case O(2K). A simple optimal detection algorithm is given, which when generalized has a complexity that is exponential not in the number of users but in the number of unique crosscorrelation values


File-Update Based Steganography for Microsoft PowerPoint Files

Yongping Liu; Xingming Sun; Yuling Liu; Rong Xiao Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on, 2008

Microsoft PowerPoint files (PPT files for short) are widely used today but steganographic schemes for them have rarely been reported. Through detailed analysis, we discover that the PPT file update mechanism, which is employed by Microsoft PowerPoint Application to update the corresponding PPT file when saving a modified presentation, can produce redundant data in a PPT file. In light of ...


More Xplore Articles

Educational Resources on Steganography

Back to Top

eLearning

No eLearning Articles are currently tagged "Steganography"

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Steganography"

IEEE-USA E-Books

No IEEE-USA E-Books are currently tagged "Steganography"



Standards related to Steganography

Back to Top

No standards are currently tagged "Steganography"


Jobs related to Steganography

Back to Top