23   Artículos

 
en línea
Arun Kumar Rai, Hari Om, Satish Chand and Chia-Chen Lin    
In today?s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reversible dat... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Urmila Pilania, Rohit Tanwar, Mazdak Zamani and Azizah Abdul Manaf    
In today?s world of computers everyone is communicating their personal information through the web. So, the security of personal information is the main concern from the research point of view. Steganography can be used for the security purpose of person... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ibrahim Abunadi, Hanan Abdullah Mengash, Saud S. Alotaibi, Mashael M. Asiri, Manar Ahmed Hamza, Abu Sarwar Zamani, Abdelwahed Motwakel and Ishfaq Yaseen    
Recent developments of semiconductor and communication technologies have resulted in the interconnection of numerous devices in offering seamless communication and services, which is termed as Internet of Everything (IoE). It is a subset of Internet of T... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Saurabh Agarwal and Ki-Hyun Jung    
Digital images are very popular and commonly used for hiding crucial data. In a few instances, image steganography is misused for communicating with improper data. In this paper, a robust deep neural network is proposed for the identification of content-... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hala A. Naman,Naseer Ali Hussien,Mohand Lokman Al-dabag,Haider Th.Salim Alrikabi     Pág. pp. 172 - 183
One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion ... ver más

 
en línea
Omar Younis Abdulhammed     Pág. 28 - 36
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

 
en línea
Jun Park and Youngho Cho    
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Piotr Artiemjew and Aleksandra Kislak-Malinowska    
Our concern in this paper is to explore the possibility of using rough inclusions for image steganography. We present our initial research using indiscernibility relation as a steganographic key for hiding information into the stego carrier by means of a... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Haidong Zhong, Xianyi Chen and Qinglong Tian    
Recently, reversible image transformation (RIT) technology has attracted considerable attention because it is able not only to generate stego-images that look similar to target images of the same size, but also to recover the secret image losslessly. The... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ladeh S. Abdulraman, Sheerko R. Hma Salah, Halgurd S. Maghdid, Azhin T. Sabir     Pág. 1 - 7
Steganography is a way to convey secret communication, with rapid electronic communication and high demand of using the internet, steganography has become a wide field of research and discussion. In this paper a new approach for hiding information in cov... ver más
Revista: Innovaciencia    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »