38 resources related to Steganography
- Topics related to Steganography
- IEEE Organizations related to Steganography
- Conferences related to Steganography
- Periodicals related to Steganography
- Most published Xplore authors for Steganography
2014 IEEE International Conference on Systems, Man and Cybernetics - SMC
SMC2014 targets advances in Systems Science and Engineering, Human-Machine Systems, and Cybernetics involving state-of-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies, and emerging applications.
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
The scope of the Conference includes include, but are certainly not limited to the following: Mobile computing Grid / Cloud / Parallel Computing Optical / Quantum Computing Soft Computing Pattern Recognition Signal / Image Processing Biometrics / Biomedical Engineering Mobile Communication Broadband Communication Wireless Communication Optical Communication RF Electronics Electronics Devices / Systems VLSI / Embedded Systems MEMS/NEMS Nanotechnology Photonic / Opto-electronic Structures / Devices Optical Ne
2012 15th International Multitopic Conference (INMIC)
Conference scope revolves around activities such as Tutorials, Invited Talks, Research Papers, Workshops and Posters which will be held in academic disciplines that including Computer Science, Software Engineering, Information System, Information Technology, Electronics and Computer Engineering.
The conference is an international forum for the presentation of technological advances and research results in the fields of Computer Science and Information Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world.
The aim objective of ICACC 2010 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in the fields of Advanced Computer Control, Automation, Database System, Communication Systems, and Applied Computer Science.
IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...
Yongzhen Zheng; Fenlin Liu; Xiangyang Luo; Chunfang Yang Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on, 2012
Reliable identification of steganography software is an important research direction of steganography forensics, how to identify the steganography software based on the characteristics of steganography algorithm is the difficulty in the research of identifying the steganography software. In this paper, based on the principles of LSB Steganography algorithm (include LSB Replacement and LSB Matching), we propose an approach to identify ...
Yongzhen Zheng; Fenlin Liu; Chunfang Yang; Xiangyang Luo; Kun Zhao Multimedia Information Networking and Security (MINES), 2011 Third International Conference on, 2011
In this paper, based on the principles of LSB Replacement Steganography algorithm, we propose an approach to identify steganography software by Core Instructions Template Matching. First, we take the process of operations to the pixels in the LSB Replacement steganography algorithm as Core Instructions, and we have analyzed the implementation of Core Instructions in a variety of typical steganography software ...
Hamdaqa, M.; Tahvildari, L. Secure Software Integration and Reliability Improvement (SSIRI), 2011 Fifth International Conference on, 2011
VoIP steganography is a real-time network steganography, which utilizes VoIP protocols and traffic as a covert channel to conceal secret messages. Recently, there has been a noticeable increase in the interest in VoIP steganography due to the volume of VoIP traffic generated, which proved to be economically feasible to utilize. This paper discusses VoIP steganography challenges, compares the existing mechanisms, ...
Marwaha, P.; Marwaha, P. Computing Communication and Networking Technologies (ICCCNT), 2010 International Conference on, 2010
In today's information age, information sharing and transfer has increased exponentially. The threat of an intruder accessing secret information has been an ever existing concern for the data communication experts. Cryptography and steganography are the most widely used techniques to overcome this threat. Cryptography involves converting a message text into an unreadable cipher. On the other hand, steganography embeds message ...
Thanikaiselvan, V.; Arulmozhivarman, P. Signal and Image Processing Applications (ICSIPA), 2013 IEEE International Conference on, 2013
Steganography conceals the secret information inside the cover medium. There are two types of steganography techniques available practically. They are spatial domain steganography and Transform domain steganography. The objectives to be considered in the steganography methods are high capacity, imperceptibility and robustness. In this paper, a Color image steganography in transform domain is proposed. Reversible Integer Haar wavelet transform is ...
No standards are currently tagged "Steganography"
No jobs are currently tagged "Steganography"