1,141 resources related to Steganography
- Topics related to Steganography
- IEEE Organizations related to Steganography
- Conferences related to Steganography
- Periodicals related to Steganography
- Most published Xplore authors for Steganography
2014 IEEE International Conference on Systems, Man and Cybernetics - SMC
SMC2014 targets advances in Systems Science and Engineering, Human-Machine Systems, and Cybernetics involving state-of-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies, and emerging applications.
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
The scope of the Conference includes include, but are certainly not limited to the following:Mobile computingGrid / Cloud / Parallel ComputingOptical / Quantum ComputingSoft ComputingPattern RecognitionSignal / Image ProcessingBiometrics / Biomedical EngineeringMobile CommunicationBroadband CommunicationWireless CommunicationOptical CommunicationRF ElectronicsElectronics Devices / SystemsVLSI / Embedded SystemsMEMS/NEMSNanotechnologyPhotonic / Opto-electronic Structures / DevicesOptical NetworksMobile / Sensor / Ad-hoc NetworksInternet/Multimedia NetworksNetwork Security / Cryptography
2012 15th International Multitopic Conference (INMIC)
Conference scope revolves around activities such as Tutorials, Invited Talks, Research Papers, Workshops and Posters which will be held in academic disciplines that including Computer Science, Software Engineering, Information System, Information Technology, Electronics and Computer Engineering.
The conference is an international forum for the presentation of technological advances and research results in the fields of Computer Science and Information Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world.
The aim objective of ICACC 2010 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in the fields of Advanced Computer Control, Automation, Database System, Communication Systems, and Applied Computer Science.
IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...
Youail, R.S.; Samawi, V.W.; Kadhim, A.-K.A.-R. Anti-counterfeiting, Security and Identification, 2008. ASID 2008. 2nd International Conference on, 2008
Steganography is the art and science of hiding that a communication is taken place. It embeds the secret file (text, audio or image) in other carrier file. Text in image steganography is considered in this work. The proposed stegosystem uses Spread Spectrum technique which is applied in spatial domain together with error correction coding. These are used to increase the ...
Farouk, H.A.; Saeb, M. Design Automation Conference, 2004. Proceedings of the ASP-DAC 2004. Asia and South Pacific, 2004
In the well-known "prisoners' problem", a representative example of steganopphy, two persons attempt to communicate covertly without alerting the warden. One approach to achieve this task is to embed the message in an innocent-looking cover-media. In our model. the message contents are scattered in the cover in a certain way that is based on a secret key known only to ...
Yu Qiudong; Xiao-Wei Liu Intelligent Networks and Intelligent Systems, 2009. ICINIS '09. Second International Conference on, 2009
Based on the researches of LSB (least significant bit, i.e. the last bit of a binary pixel value) matching steganographic method and the steganalytic method which aims at histograms of cover images, this paper proposes a new LSB matching steganographic method. A steganographic information table is defined to record the changes which are introduced by the embedded secrete bits. According ...
Tirkel, A.Z.; Van Schyndel, R.G.; Hall, T.; Osborne, C.F. Pattern Recognition, 1998. Proceedings. Fourteenth International Conference on, 1998
This paper introduces two-dimensional arrays for watermarking images. Binary, greyscale and colour (3D) arrays are examined. New constructions known as the "distinct sums" arrays are presented
Geetha, S.; Sindhu, S.S.S.; Kamaraj, N. Advanced Computing and Communications, 2008. ADCOM 2008. 16th International Conference on, 2008
Steganography is used to hide the occurrence of communication. This creates a potential problem when this technology is misused for planning criminal activities. Differentiating anomalous images (stego image) from pure images (cover image) is difficult and tedious. This paper investigates the use of a Genetic-X-means classifier, which distinguishes a pure image from the adulterated one. The basic idea is that, ...
No standards are currently tagged "Steganography"