1,141 resources related to Steganography
- Topics related to Steganography
- IEEE Organizations related to Steganography
- Conferences related to Steganography
- Periodicals related to Steganography
- Most published Xplore authors for Steganography
2014 IEEE International Conference on Systems, Man and Cybernetics - SMC
SMC2014 targets advances in Systems Science and Engineering, Human-Machine Systems, and Cybernetics involving state-of-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies, and emerging applications.
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
The scope of the Conference includes include, but are certainly not limited to the following:Mobile computingGrid / Cloud / Parallel ComputingOptical / Quantum ComputingSoft ComputingPattern RecognitionSignal / Image ProcessingBiometrics / Biomedical EngineeringMobile CommunicationBroadband CommunicationWireless CommunicationOptical CommunicationRF ElectronicsElectronics Devices / SystemsVLSI / Embedded SystemsMEMS/NEMSNanotechnologyPhotonic / Opto-electronic Structures / DevicesOptical NetworksMobile / Sensor / Ad-hoc NetworksInternet/Multimedia NetworksNetwork Security / Cryptography
2012 15th International Multitopic Conference (INMIC)
Conference scope revolves around activities such as Tutorials, Invited Talks, Research Papers, Workshops and Posters which will be held in academic disciplines that including Computer Science, Software Engineering, Information System, Information Technology, Electronics and Computer Engineering.
The conference is an international forum for the presentation of technological advances and research results in the fields of Computer Science and Information Technology. The conference will bring together leading researchers, engineers and scientists in the domain of interest from around the world.
The aim objective of ICACC 2010 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in the fields of Advanced Computer Control, Automation, Database System, Communication Systems, and Applied Computer Science.
IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...
Tolba, M.F.; Ghonemy, M.A.-S.; Taha, I.A.-H.; Khalifa, A.S. Computers and Communications, 2004. Proceedings. ISCC 2004. Ninth International Symposium on, 2004
Digital steganography exploits the use of a host data to hide a piece of information in such a way that it is imperceptible to a human observer. This work presents a cover-screw algorithm based on what is called the wavelet based fusion. In this method the wavelet decomposition of both the cover image and the secret message are merged into ...
Parakh, A.; Kak, S. Communications (ICC), 2010 IEEE International Conference on, 2010
This paper presents a k-out-of-n recursive information hiding scheme based on an n-ary tree data structure. In recursive hiding of information, the user encodes additional information in the shares of the secret, intended to be originally shared, without an expansion in the size of the latter. The proposed scheme has applications in secure distributed storage and information dispersal protocols. It ...
Han Zong; Fenlin Liu; Xiangyang Luo Advanced Communication Technology, 2009. ICACT 2009. 11th International Conference on, 2009
A new approach to blind detection of JPEG images having hiding information, which is based on the feature of wavelet domain is put forward. The specific way of detection is as follows: First, decompose an image by using wavelet, calculate the co-occurrence matrix of the adjacent wavelet coefficients, and apply Laplace transform to the co-occurrence matrix. Then take the Laplace- ...
Schlegel, C.; Grant, A. Information Theory, IEEE Transactions on, 2000
It is demonstrated that optimal multiple-user detection in a linear multiple- access system with identical crosscorrelations requires only 𝒪(KlogK) operations instead of the worst case O(2K). A simple optimal detection algorithm is given, which when generalized has a complexity that is exponential not in the number of users but in the number of unique crosscorrelation values
Yongping Liu; Xingming Sun; Yuling Liu; Rong Xiao Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on, 2008
Microsoft PowerPoint files (PPT files for short) are widely used today but steganographic schemes for them have rarely been reported. Through detailed analysis, we discover that the PPT file update mechanism, which is employed by Microsoft PowerPoint Application to update the corresponding PPT file when saving a modified presentation, can produce redundant data in a PPT file. In light of ...
No standards are currently tagged "Steganography"