1,141 resources related to Steganography
- Topics related to Steganography
- IEEE Organizations related to Steganography
- Conferences related to Steganography
- Periodicals related to Steganography
- Most published Xplore authors for Steganography
2014 IEEE International Conference on Systems, Man and Cybernetics - SMC
SMC2014 targets advances in Systems Science and Engineering, Human-Machine Systems, and Cybernetics involving state-of-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies, and emerging applications.
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
The scope of the Conference includes include, but are certainly not limited to the following:Mobile computingGrid / Cloud / Parallel ComputingOptical / Quantum ComputingSoft ComputingPattern RecognitionSignal / Image ProcessingBiometrics / Biomedical EngineeringMobile CommunicationBroadband CommunicationWireless CommunicationOptical CommunicationRF ElectronicsElectronics Devices / SystemsVLSI / Embedded SystemsMEMS/NEMSNanotechnologyPhotonic / Opto-electronic Structures / DevicesOptical NetworksMobile / Sensor / Ad-hoc NetworksInternet/Multimedia NetworksNetwork Security / Cryptography
2012 15th International Multitopic Conference (INMIC)
Conference scope revolves around activities such as Tutorials, Invited Talks, Research Papers, Workshops and Posters which will be held in academic disciplines that including Computer Science, Software Engineering, Information System, Information Technology, Electronics and Computer Engineering.
The conference is an international forum for the presentation of technological advances and research results in the fields of Computer Science and Information Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world.
The aim objective of ICACC 2010 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in the fields of Advanced Computer Control, Automation, Database System, Communication Systems, and Applied Computer Science.
IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...
Stanescu, D.; Stangaciu, V.; Stratulat, M. Computational Cybernetics and Technical Informatics (ICCC-CONTI), 2010 International Joint Conference on, 2010
Steganography is a science that focuses on hiding specific messages using specialized techniques in such a way as only the sender and the intended receiver are able to decipher it, as well as knowing of its existence. Important domains, besides classic computing, where steganography can be applied are domains using mobile and embedded devices especially mobile phones. This paper tries ...
Wen-Chung Kuo; Yan-Hung Lin Innovative Computing Information and Control, 2008. ICICIC '08. 3rd International Conference on, 2008
Recently, Hwang et al. (HKC) proposed a simple improvement reversible data hiding scheme based on the histogram shift. They claim that the read don't send any additional information to the receiver in their scheme. However, it will generate an informal distribution in the histogram when the secret data is embedded into a cover image. In this paper, we will use ...
Xuping Huang; Kawashima, R.; Segawa, N.; Abe, Y. Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on, 2008
Steganography technologies developed to protect multimedia content make great progress in recent years. This paper proposes a synchronized steganography system for acoustic data. The synchronous aspect means that the secret data is to be recorded and steganographically embedded and subsequently sent or broadcasted to multiple receivers. However, only the trusted receiver can extract the secret data using a secret key ...
Marvel, L.M.; Boncelet, C.G., Jr.; Retter, C.T. Image Processing, IEEE Transactions on, 1999
We present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital ...
Dumitrescu, S.; Xiaolin Wu; Memon, N. Image Processing. 2002. Proceedings. 2002 International Conference on, 2002
We present an LSB steganalysis technique that can detect the existence of hidden messages that are randomly embedded in the least significant bits of natural continuous-tone images. The technique is inspired by the recent work of J. Fridrich et al. (see Proc. ACM Workshop on Multimedia and Security, p.27-30, 2001) and just like their work, it can also precisely measure ...
No standards are currently tagged "Steganography"