Steganography

View this topic in
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. (Wikipedia.org)






Conferences related to Steganography

Back to Top

2014 IEEE International Conference on Systems, Man and Cybernetics - SMC

SMC2014 targets advances in Systems Science and Engineering, Human-Machine Systems, and Cybernetics involving state-of-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies, and emerging applications.

  • 2013 IEEE International Conference on Systems, Man and Cybernetics - SMC

    SMC 2013 targets advances in Systems Science and Engineering Human-machine Systems and Cybernetics involving state-of-the-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies and emerging applications.

  • 2012 IEEE International Conference on Systems, Man and Cybernetics - SMC

    Theory, research and technology advances including applications in all aspects of systems science and engineering, human machine systems, and emerging cybernetics.

  • 2011 IEEE International Conference on Systems, Man and Cybernetics - SMC

    Theory, research, and technology advances including applications in all aspects of systems science and engineering, human machine systems, and emerging cybernetics.

  • 2010 IEEE International Conference on Systems, Man and Cybernetics - SMC

    The 2010 IEEE International Conference on Systems, Man, and Cybernetics (SMC2010) provides an international forum that brings together those actively involved in areas of interest to the IEEE Systems, Man, and Cybernetics Society, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics.

  • 2009 IEEE International Conference on Systems, Man and Cybernetics - SMC

    The 2009 IEEE International Conference on Systems, Man, and Cybernetics (SMC2009) provides an international forum that brings together those actively involved in areas of interest to the IEEE Systems, Man, and Cybernetics Society, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics.

  • 2008 IEEE International Conference on Systems, Man and Cybernetics - SMC


2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)

The scope of the Conference includes include, but are certainly not limited to the following:Mobile computingGrid / Cloud / Parallel ComputingOptical / Quantum ComputingSoft ComputingPattern RecognitionSignal / Image ProcessingBiometrics / Biomedical EngineeringMobile CommunicationBroadband CommunicationWireless CommunicationOptical CommunicationRF ElectronicsElectronics Devices / SystemsVLSI / Embedded SystemsMEMS/NEMSNanotechnologyPhotonic / Opto-electronic Structures / DevicesOptical NetworksMobile / Sensor / Ad-hoc NetworksInternet/Multimedia NetworksNetwork Security / Cryptography

  • 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)

    The purpose of ICCCNT 2012 is to bring together researchers from the computing, communication and networking communities to present ground-breaking research and debate key issues of common interest. International experts will share their vision, extensive experience and knowledge gained through modeling, lab and field trials and will discuss the applications of a variety of technologies world wide. It also provides ideal opportunities for consolidating and establishing collaborations at the international level.

  • 2010 International Conference on Computing, Communication and Networking Technologies (ICCCNT'10)

    The second International Conference on Computing, Communication and Networking Technologies (ICCCNT 10) will be held at the Chettinad College of Engineering and Technology (CCET), Karur (DT), TamilNadu, India from July 29th to 31st 2010. The CCET is promoted by a reputed 75 year old Group of Educational Institutions Chettinad House . The purpose of ICCCNT 10, is to bring together researchers from the computing, communication and networking communities to present ground-breaking research and debate key


2012 15th International Multitopic Conference (INMIC)

Conference scope revolves around activities such as Tutorials, Invited Talks, Research Papers, Workshops and Posters which will be held in academic disciplines that including Computer Science, Software Engineering, Information System, Information Technology, Electronics and Computer Engineering.

  • 2011 IEEE 14th International Multitopic Conference (INMIC)

    Artificial Itelligence, Control Systems and Mechatronics, Computer Networks and Security, Virtualization and Cloud Computing, Databases and Warehousing Multimedia, Computer Graphics and Image Processing, Bio-informatics Power Systems and Alternate Energy Resources, Software Engineering Wireless, Mobile and Sensor Networks, E-Government & E-Commerce, E-Learning, Semantic Web Technologies, Pervasive Ubiquitous Computing.

  • 2009 IEEE 13th International Multitopic Conference (INMIC)

    IEEE INMIC is held every year and INMIC 2009 will be the 13th in the series. INMIC has become Pakistan s flagship technical conference with a broad scope, thereby inviting interest of a large audience. The conference targets research presentations by academic and professional researchers, and also includes a series of tutorials, enabling participants to learn about the latest trends in technology. Research contributions are expected from the participants, covering various disciplines under IEEE s domain, in

  • 2008 International Multitopic Conference (INMIC)

    Communication Systems & Techniques Laser and Fiber Optics Wireless & Mobile Communication Systems Theoretical and Applied Information Technology Digital Signal Processing Distributed and Grid Computing Image Processing & Recognition Algorithms, Tools & Applications Photonics & Opto-Electronics Artificial Intelligence Embedded Systems and VLSI Broadband Networks Nano Technologies Computer Graphics Biomedical Engineering Control and Automation Power Electronics Soft Computing Satelli

  • 2007 IEEE International Multitopic Conference (INMIC)

    The IEEE International Multi-topic Conference INMIC has emerged as a leading forum in Pakistan for engineering professionals and researchers to dis-cuss and present the latest research trends and re-sults in the field of Science & Technology. INMIC 2007 promises to be an exciting event that will host leading Electrical Engineering researchers from across the globe and will provide opportunity to build international research collaborations.


2011 4th IEEE International Conference on Computer Science and Information Technology (ICCSIT 2011)

The conference is an international forum for the presentation of technological advances and research results in the fields of Computer Science and Information Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world.


2010 2nd International Conference on Advanced Computer Control (ICACC)

The aim objective of ICACC 2010 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in the fields of Advanced Computer Control, Automation, Database System, Communication Systems, and Applied Computer Science.


More Conferences

Periodicals related to Steganography

Back to Top

Internet Computing, IEEE

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...




Xplore Articles related to Steganography

Back to Top

A LSB substitution compatible steganography

Hung-Min Sun; King-Hang Wang; Chih-Cheng Liang; Yih-Sien Kao TENCON 2007 - 2007 IEEE Region 10 Conference, 2007

Substituting the least-significant-bits (LSBs) of an image is the easiest and most popular scheme in information hiding. Works have been done to point out this algorithm can be detected by some steganalysis techniques. One of these techniques is called histogram analysis. In this work, we propose a new scheme that is compatible to LSB substitution and its variance LSB matching. ...


A new (t, n) threshold image hiding scheme for sharing a secret color image

Chin-Chen Chang; Iuon-Chang Lin Communication Technology Proceedings, 2003. ICCT 2003. International Conference on, 2003

The objective of this research is to develop a method to hide a secret color image inside a set of meaningful color images. It allows a group of n members to share the secret image such that any t or more members can cooperatively construct the secret color image, but (t-1) or less members cannot. In addition, this technique has ...


Colored image-in-image hiding

Al Rababaa, M.S. CAD Systems in Microelectronics, 2009. CADSM 2009. 10th International Conference - The Experience of Designing and Application of, 2009

Image hiding is a technique that embeds the important images into a cover image such that the important images are imperceptible and can be securely transmitted to the receiver. In this paper, we present a steganographic method and software for embedding a digital image (color image) in a true color image requires the use of uncompressed 24-bit windows format bitmap ...


Information Hinding Based on GSM Full Rate Speech Coding

Hu Licai; Wang Shuozhong Wireless Communications, Networking and Mobile Computing, 2006. WiCOM 2006.International Conference on, 2006

A steganographic method is proposed to embed secret data in GSM full rate transcoding bit stream. Depending on the unequal importance with respect to speech subjective quality of encoded parameters and their individual bits, appropriate bits, which have relatively low importance for the quality of host speech, are chosen to embed secret data. The secret information can be anything such ...


Adaptation of Text Steganographic Algorithms for HTML

Barilnik, S.S.; Minin, I.V.; Minin, O.V. Electron Devices and Materials, 2007. EDM '07. 8th Siberian Russian Workshop and Tutorial on, 2007

Nowadays the Internet is a highly developed communication system. Every day the number of the users of the Internet increases for thousands of people. This system is open for everybody: either a law- abiding and decent person or a quite opposite one. This leads to such problems of the defense of information as copyright and transmission of hidden messages via ...


More Xplore Articles

Educational Resources on Steganography

Back to Top

eLearning

A LSB substitution compatible steganography

Hung-Min Sun; King-Hang Wang; Chih-Cheng Liang; Yih-Sien Kao TENCON 2007 - 2007 IEEE Region 10 Conference, 2007

Substituting the least-significant-bits (LSBs) of an image is the easiest and most popular scheme in information hiding. Works have been done to point out this algorithm can be detected by some steganalysis techniques. One of these techniques is called histogram analysis. In this work, we propose a new scheme that is compatible to LSB substitution and its variance LSB matching. ...


A new (t, n) threshold image hiding scheme for sharing a secret color image

Chin-Chen Chang; Iuon-Chang Lin Communication Technology Proceedings, 2003. ICCT 2003. International Conference on, 2003

The objective of this research is to develop a method to hide a secret color image inside a set of meaningful color images. It allows a group of n members to share the secret image such that any t or more members can cooperatively construct the secret color image, but (t-1) or less members cannot. In addition, this technique has ...


Colored image-in-image hiding

Al Rababaa, M.S. CAD Systems in Microelectronics, 2009. CADSM 2009. 10th International Conference - The Experience of Designing and Application of, 2009

Image hiding is a technique that embeds the important images into a cover image such that the important images are imperceptible and can be securely transmitted to the receiver. In this paper, we present a steganographic method and software for embedding a digital image (color image) in a true color image requires the use of uncompressed 24-bit windows format bitmap ...


Information Hinding Based on GSM Full Rate Speech Coding

Hu Licai; Wang Shuozhong Wireless Communications, Networking and Mobile Computing, 2006. WiCOM 2006.International Conference on, 2006

A steganographic method is proposed to embed secret data in GSM full rate transcoding bit stream. Depending on the unequal importance with respect to speech subjective quality of encoded parameters and their individual bits, appropriate bits, which have relatively low importance for the quality of host speech, are chosen to embed secret data. The secret information can be anything such ...


Adaptation of Text Steganographic Algorithms for HTML

Barilnik, S.S.; Minin, I.V.; Minin, O.V. Electron Devices and Materials, 2007. EDM '07. 8th Siberian Russian Workshop and Tutorial on, 2007

Nowadays the Internet is a highly developed communication system. Every day the number of the users of the Internet increases for thousands of people. This system is open for everybody: either a law- abiding and decent person or a quite opposite one. This leads to such problems of the defense of information as copyright and transmission of hidden messages via ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Steganography"

IEEE-USA E-Books

No IEEE-USA E-Books are currently tagged "Steganography"



Standards related to Steganography

Back to Top

No standards are currently tagged "Steganography"


Jobs related to Steganography

Back to Top