1,141 resources related to Steganography
- Topics related to Steganography
- IEEE Organizations related to Steganography
- Conferences related to Steganography
- Periodicals related to Steganography
- Most published Xplore authors for Steganography
2014 IEEE International Conference on Systems, Man and Cybernetics - SMC
SMC2014 targets advances in Systems Science and Engineering, Human-Machine Systems, and Cybernetics involving state-of-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies, and emerging applications.
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
The scope of the Conference includes include, but are certainly not limited to the following:Mobile computingGrid / Cloud / Parallel ComputingOptical / Quantum ComputingSoft ComputingPattern RecognitionSignal / Image ProcessingBiometrics / Biomedical EngineeringMobile CommunicationBroadband CommunicationWireless CommunicationOptical CommunicationRF ElectronicsElectronics Devices / SystemsVLSI / Embedded SystemsMEMS/NEMSNanotechnologyPhotonic / Opto-electronic Structures / DevicesOptical NetworksMobile / Sensor / Ad-hoc NetworksInternet/Multimedia NetworksNetwork Security / Cryptography
2012 15th International Multitopic Conference (INMIC)
Conference scope revolves around activities such as Tutorials, Invited Talks, Research Papers, Workshops and Posters which will be held in academic disciplines that including Computer Science, Software Engineering, Information System, Information Technology, Electronics and Computer Engineering.
The conference is an international forum for the presentation of technological advances and research results in the fields of Computer Science and Information Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world.
The aim objective of ICACC 2010 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in the fields of Advanced Computer Control, Automation, Database System, Communication Systems, and Applied Computer Science.
IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...
Xiaomei Quan; Hongbin Zhang Applications of Digital Information and Web Technologies, 2009. ICADIWT '09. Second International Conference on the, 2009
Most current steganalysis schemes are based on the Cachin's statistical undetectability. However, the lack of the statistical model for the natural images limits the performance of the current steganalyzers. In this paper, we propose a novel steganalyzer for JPEG images based on manifold learning, which overcomes the statistical steganalyzer's deficiencies. The feature extraction in this steganalyzer is completed by the ...
Cheng-Hung Chuang; Lin, T.C.-I. Circuits and Systems, 2009. ISCAS 2009. IEEE International Symposium on, 2009
In this paper, an optical cryptosystem with adaptive steganography is proposed for color image encryption and decryption. The optical cryptosystem employs a double random phase encoding algorithm to encrypt and decrypt color images. The color image is first separated into three channels: red, green, and blue. Each channel is encrypted by two random phase masks generated from session keys. For ...
Changyong Xu; Xijian Ping Image and Graphics, 2007. ICIG 2007. Fourth International Conference on, 2007
A steganographic algorithm for embedding secret bits into uncompressed video sequence was proposed in this paper. The difference between adjacent frames, which is called motion component, indicates the motion of video, and is not obviously affected by video compression. So motion component was used to embed secret bits for increasing the capability of resisting video compression. Motion component was firstly ...
Mei-Yi Wu; Chuan-Chi Hsu; Jia-Hong Lee Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP '09. Fifth International Conference on, 2009
Geotagging, in which digital photos are labelled with the location where they were taken, becomes more popular today. Users can browse the photos on digital map and make the Web photo sharing and management even more conveniently. However, lacking the function of authentication and the way to deal with the situation that information within the EXIF area being falsified, the ...
Xuexiu Zhu; Weiming Zhang; Jianqing Qi; Jiufen Liu Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on, 2010
Perturbed Quantization (PQ) and Modified Matrix Encoding (MME) are two efficient embedding methods for JPEG steganography, in which the sender uses the side information of quantizing procedure of DCT coefficients to minimize the embedding distortion. In this paper, we propose a novel embedding method which can be viewed as a generalization of the MME to utilize the quantizing information by ...
No standards are currently tagged "Steganography"