Steganography

View this topic in
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. (Wikipedia.org)






Conferences related to Steganography

Back to Top

2014 IEEE International Conference on Systems, Man and Cybernetics - SMC

SMC2014 targets advances in Systems Science and Engineering, Human-Machine Systems, and Cybernetics involving state-of-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies, and emerging applications.

  • 2013 IEEE International Conference on Systems, Man and Cybernetics - SMC

    SMC 2013 targets advances in Systems Science and Engineering Human-machine Systems and Cybernetics involving state-of-the-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies and emerging applications.

  • 2012 IEEE International Conference on Systems, Man and Cybernetics - SMC

    Theory, research and technology advances including applications in all aspects of systems science and engineering, human machine systems, and emerging cybernetics.

  • 2011 IEEE International Conference on Systems, Man and Cybernetics - SMC

    Theory, research, and technology advances including applications in all aspects of systems science and engineering, human machine systems, and emerging cybernetics.

  • 2010 IEEE International Conference on Systems, Man and Cybernetics - SMC

    The 2010 IEEE International Conference on Systems, Man, and Cybernetics (SMC2010) provides an international forum that brings together those actively involved in areas of interest to the IEEE Systems, Man, and Cybernetics Society, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics.

  • 2009 IEEE International Conference on Systems, Man and Cybernetics - SMC

    The 2009 IEEE International Conference on Systems, Man, and Cybernetics (SMC2009) provides an international forum that brings together those actively involved in areas of interest to the IEEE Systems, Man, and Cybernetics Society, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics.

  • 2008 IEEE International Conference on Systems, Man and Cybernetics - SMC


2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)

The scope of the Conference includes include, but are certainly not limited to the following: Mobile computing Grid / Cloud / Parallel Computing Optical / Quantum Computing Soft Computing Pattern Recognition Signal / Image Processing Biometrics / Biomedical Engineering Mobile Communication Broadband Communication Wireless Communication Optical Communication RF Electronics Electronics Devices / Systems VLSI / Embedded Systems MEMS/NEMS Nanotechnology Photonic / Opto-electronic Structures / Devices Optical Ne

  • 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)

    The purpose of ICCCNT 2012 is to bring together researchers from the computing, communication and networking communities to present ground-breaking research and debate key issues of common interest. International experts will share their vision, extensive experience and knowledge gained through modeling, lab and field trials and will discuss the applications of a variety of technologies world wide. It also provides ideal opportunities for consolidating and establishing collaborations at the international l

  • 2010 International Conference on Computing, Communication and Networking Technologies (ICCCNT'10)

    The second International Conference on Computing, Communication and Networking Technologies (ICCCNT 10) will be held at the Chettinad College of Engineering and Technology (CCET), Karur (DT), TamilNadu, India from July 29th to 31st 2010. The CCET is promoted by a reputed 75 year old Group of Educational Institutions Chettinad House . The purpose of ICCCNT 10, is to bring together researchers from the computing, communication and networking communities to present ground-breaking research and debate key


2012 15th International Multitopic Conference (INMIC)

Conference scope revolves around activities such as Tutorials, Invited Talks, Research Papers, Workshops and Posters which will be held in academic disciplines that including Computer Science, Software Engineering, Information System, Information Technology, Electronics and Computer Engineering.

  • 2011 IEEE 14th International Multitopic Conference (INMIC)

    Artificial Itelligence, Control Systems and Mechatronics, Computer Networks and Security, Virtualization and Cloud Computing, Databases and Warehousing Multimedia, Computer Graphics and Image Processing, Bio-informatics Power Systems and Alternate Energy Resources, Software Engineering Wireless, Mobile and Sensor Networks, E-Government & E-Commerce, E-Learning, Semantic Web Technologies, Pervasive Ubiquitous Computing.

  • 2009 IEEE 13th International Multitopic Conference (INMIC)

    IEEE INMIC is held every year and INMIC 2009 will be the 13th in the series. INMIC has become Pakistan s flagship technical conference with a broad scope, thereby inviting interest of a large audience. The conference targets research presentations by academic and professional researchers, and also includes a series of tutorials, enabling participants to learn about the latest trends in technology. Research contributions are expected from the participants, covering various disciplines under IEEE s domain, in

  • 2008 International Multitopic Conference (INMIC)

    Communication Systems & Techniques Laser and Fiber Optics Wireless & Mobile Communication Systems Theoretical and Applied Information Technology Digital Signal Processing Distributed and Grid Computing Image Processing & Recognition Algorithms, Tools & Applications Photonics & Opto-Electronics Artificial Intelligence Embedded Systems and VLSI Broadband Networks Nano Technologies Computer Graphics Biomedical Engineering Control and Automation Power Electronics Soft Computing Satelli

  • 2007 IEEE International Multitopic Conference (INMIC)

    The IEEE International Multi-topic Conference INMIC has emerged as a leading forum in Pakistan for engineering professionals and researchers to dis-cuss and present the latest research trends and re-sults in the field of Science & Technology. INMIC 2007 promises to be an exciting event that will host leading Electrical Engineering researchers from across the globe and will provide opportunity to build international research collaborations.


2011 4th IEEE International Conference on Computer Science and Information Technology (ICCSIT 2011)

The conference is an international forum for the presentation of technological advances and research results in the fields of Computer Science and Information Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world.


2010 2nd International Conference on Advanced Computer Control (ICACC)

The aim objective of ICACC 2010 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in the fields of Advanced Computer Control, Automation, Database System, Communication Systems, and Applied Computer Science.


More Conferences

Periodicals related to Steganography

Back to Top

Internet Computing, IEEE

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...




Xplore Articles related to Steganography

Back to Top

A Method Based on Feature Matching to Identify Steganography Software

Yongzhen Zheng; Fenlin Liu; Xiangyang Luo; Chunfang Yang Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on, 2012

Reliable identification of steganography software is an important research direction of steganography forensics, how to identify the steganography software based on the characteristics of steganography algorithm is the difficulty in the research of identifying the steganography software. In this paper, based on the principles of LSB Steganography algorithm (include LSB Replacement and LSB Matching), we propose an approach to identify ...


Identification of Steganography Software Based on Core Instructions Template Matching

Yongzhen Zheng; Fenlin Liu; Chunfang Yang; Xiangyang Luo; Kun Zhao Multimedia Information Networking and Security (MINES), 2011 Third International Conference on, 2011

In this paper, based on the principles of LSB Replacement Steganography algorithm, we propose an approach to identify steganography software by Core Instructions Template Matching. First, we take the process of operations to the pixels in the LSB Replacement steganography algorithm as Core Instructions, and we have analyzed the implementation of Core Instructions in a variety of typical steganography software ...


An analysis of LSB based image steganography techniques

Thangadurai, K.; Sudha Devi, G. Computer Communication and Informatics (ICCCI), 2014 International Conference on, 2014

Steganography refers to information or a file that has been concealed inside a digital picture, video or audio file. If a person views the object in which the information is hidden inside, he or she will have no indication that there is any hidden information. So the person will not try to decrypt the information. Steganography can be divided into ...


ReLACK: A Reliable VoIP Steganography Approach

Hamdaqa, M.; Tahvildari, L. Secure Software Integration and Reliability Improvement (SSIRI), 2011 Fifth International Conference on, 2011

VoIP steganography is a real-time network steganography, which utilizes VoIP protocols and traffic as a covert channel to conceal secret messages. Recently, there has been a noticeable increase in the interest in VoIP steganography due to the volume of VoIP traffic generated, which proved to be economically feasible to utilize. This paper discusses VoIP steganography challenges, compares the existing mechanisms, ...


Lazy Wavelet Transform Based Steganography in Video

Patel, K.; Rora, K.K.; Singh, K.; Verma, S. Communication Systems and Network Technologies (CSNT), 2013 International Conference on, 2013

Visual steganography is the most widely practiced form of steganography. It started with concealing messages within the lowest bits of noisy images or sound files. We shall perform steganography on video files and hide the message in an encrypted format, thus achieving a multiple cryptographic system. The most commonly used technique is Least Significant Bit steganography (LSB steganography). But instead ...


More Xplore Articles

Educational Resources on Steganography

Back to Top

eLearning

No eLearning Articles are currently tagged "Steganography"

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Steganography"

IEEE-USA E-Books

No IEEE-USA E-Books are currently tagged "Steganography"



Standards related to Steganography

Back to Top

No standards are currently tagged "Steganography"


Jobs related to Steganography

Back to Top

No jobs are currently tagged "Steganography"