38 resources related to Steganography
- Conferences related to Steganography
- Xplore Articles related to Steganography
- Jobs related to Steganography
- Educational Resources on Steganography
- Standards related to Steganography
2014 IEEE International Conference on Systems, Man and Cybernetics - SMC
SMC2014 targets advances in Systems Science and Engineering, Human-Machine Systems, and Cybernetics involving state-of-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies, and emerging applications.
2013 16th International Multi Topic Conference (INMIC)
Telecommunication, Embedded Systems, Reconfigurable Computing, VLSI Design, Digital/Image Processing, Biomedical Engineering, Artificial Intelligence, Control System, Power Electronics and Power Systems
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
The scope of the Conference includes include, but are certainly not limited to the following: Mobile computing Grid / Cloud / Parallel Computing Optical / Quantum Computing Soft Computing Pattern Recognition Signal / Image Processing Biometrics / Biomedical Engineering Mobile Communication Broadband Communication Wireless Communication Optical Communication RF Electronics Electronics Devices / Systems VLSI / Embedded Systems MEMS/NEMS Nanotechnology Photonic / Opto-electronic Structures / Devices Optical Ne
The conference is an international forum for the presentation of technological advances and research results in the fields of Computer Science and Information Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world.
The aim objective of ICACC 2010 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in the fields of Advanced Computer Control, Automation, Database System, Communication Systems, and Applied Computer Science.
Yongzhen Zheng; Fenlin Liu; Xiangyang Luo; Chunfang Yang Multimedia Information Networking and Security (MINES), 2012 Fourth International Conference on, 2012
Reliable identification of steganography software is an important research direction of steganography forensics, how to identify the steganography software based on the characteristics of steganography algorithm is the difficulty in the research of identifying the steganography software. In this paper, based on the principles of LSB Steganography algorithm (include LSB Replacement and LSB Matching), we propose an approach to identify ...
Yongzhen Zheng; Fenlin Liu; Chunfang Yang; Xiangyang Luo; Kun Zhao Multimedia Information Networking and Security (MINES), 2011 Third International Conference on, 2011
In this paper, based on the principles of LSB Replacement Steganography algorithm, we propose an approach to identify steganography software by Core Instructions Template Matching. First, we take the process of operations to the pixels in the LSB Replacement steganography algorithm as Core Instructions, and we have analyzed the implementation of Core Instructions in a variety of typical steganography software ...
Hamdaqa, M.; Tahvildari, L. Secure Software Integration and Reliability Improvement (SSIRI), 2011 Fifth International Conference on, 2011
VoIP steganography is a real-time network steganography, which utilizes VoIP protocols and traffic as a covert channel to conceal secret messages. Recently, there has been a noticeable increase in the interest in VoIP steganography due to the volume of VoIP traffic generated, which proved to be economically feasible to utilize. This paper discusses VoIP steganography challenges, compares the existing mechanisms, ...
Patel, K.; Rora, K.K.; Singh, K.; Verma, S. Communication Systems and Network Technologies (CSNT), 2013 International Conference on, 2013
Visual steganography is the most widely practiced form of steganography. It started with concealing messages within the lowest bits of noisy images or sound files. We shall perform steganography on video files and hide the message in an encrypted format, thus achieving a multiple cryptographic system. The most commonly used technique is Least Significant Bit steganography (LSB steganography). But instead ...
Thanikaiselvan, V.; Arulmozhivarman, P. Signal and Image Processing Applications (ICSIPA), 2013 IEEE International Conference on, 2013
Steganography conceals the secret information inside the cover medium. There are two types of steganography techniques available practically. They are spatial domain steganography and Transform domain steganography. The objectives to be considered in the steganography methods are high capacity, imperceptibility and robustness. In this paper, a Color image steganography in transform domain is proposed. Reversible Integer Haar wavelet transform is ...
No jobs are currently tagged "Steganography"
No standards are currently tagged "Steganography"
IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...