Software watermarking: models and dynamic embeddings
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A steganographic method based upon JPEG and quantization table modification
Information Sciences—Informatics and Computer Science: An International Journal - Special issue: Intelligent multimedia computing and networking
Digital Steganography: Hiding Data within Data
IEEE Internet Computing
Detecting LSB Steganography in Color and Gray-Scale Images
IEEE MultiMedia
Protecting Digital-Image Copyrights: A Framework
IEEE Computer Graphics and Applications
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Video error correction using steganography
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
DNIS '00 Proceedings of the International Workshop on Databases in Networked Information Systems
Lossy Compression Tolerant Steganography
Proceedings of the First International Conference on The Human Society and the Internet - Internet Related Socio-Economic Issues
SVD-Based Approach to Transparent Embedding Data into Digital Images
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection
ISW '00 Proceedings of the Third International Workshop on Information Security
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Data Encryption Using MRF with an RSA Key
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
A steganographic method for images by pixel-value differencing
Pattern Recognition Letters
Web based image authentication using invisible Fragile watermark
VIP '01 Proceedings of the Pan-Sydney area workshop on Visual information processing - Volume 11
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
SCAN-Based Compression-Encryption-Hiding for Video on Demand
IEEE MultiMedia
Authentication of LZ-77 compressed data
Proceedings of the 2003 ACM symposium on Applied computing
An iterative method of palette-based image steganography
Pattern Recognition Letters
Cyber warfare: steganography vs. steganalysis
Communications of the ACM - Voting systems
Information hiding based on search-order coding for VQ indices
Pattern Recognition Letters
A Java framework for experimentation with steganography
Proceedings of the 36th SIGCSE technical symposium on Computer science education
Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 2
A review of information security issues and respective research contributions
ACM SIGMIS Database
Speaker verification security improvement by means of speech watermarking
Speech Communication
Steganography obliterator: an attack on the least significant bits
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Speaker identification security improvement by means of speech watermarking
Pattern Recognition
Video error correction using steganography
EURASIP Journal on Applied Signal Processing
Unicode Steganographic Exploits: Maintaining Enterprise Border Security
IEEE Security and Privacy
Steganographic methods based on digital logic
SIP'07 Proceedings of the 6th Conference on 6th WSEAS International Conference on Signal Processing - Volume 6
A novel secret image sharing scheme in color images using small shadow images
Information Sciences: an International Journal
Seeing the invisible: forensic uses of anomaly detection and machine learning
ACM SIGOPS Operating Systems Review
Message hidden in 1st and 2nd bit plane
ICCOMP'05 Proceedings of the 9th WSEAS International Conference on Computers
ICS'05 Proceedings of the 9th WSEAS International Conference on Systems
The capability of image in hiding a secret message
SSIP'06 Proceedings of the 6th WSEAS International Conference on Signal, Speech and Image Processing
Sharing secrets in stego images with authentication
Pattern Recognition
StegCure: a comprehensive steganographic tool using enhanced LSB scheme
WSEAS Transactions on Computers
WhiteSteg: a new scheme in information hiding using text steganography
WSEAS Transactions on Computers
Data hiding method using image interpolation
Computer Standards & Interfaces
An improved steganalysis approach for breaking the F5 algorithm
WSEAS Transactions on Computers
The Hiding of Secret Data Using the Run Length Matching Method
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies
Fundamenta Informaticae
Fusion Based Blind Image Steganalysis by Boosting Feature Selection
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
Steganalysis of JPEG Images with Joint Transform Features
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
StegCure: an amalgamation of different steganographic methods in GIF image
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
Steganalysis of JPEG images: an improved approach for breaking the F5 algorithm
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
Proceedings of the International Conference on Advances in Computing, Communication and Control
A document protection scheme using innocuous messages as camouflage
WSEAS Transactions on Information Science and Applications
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Secret image sharing based on cellular automata and steganography
Pattern Recognition
How to include visuals and interactivities in an educational computer graphics repository
Computers and Graphics
Ranking secure technologies in security provision financial transactions mobile commerce
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
A New Steganography Based on Χ2 Technic
CIARP '09 Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
Evaluation of Feature Selection Measures for Steganalysis
PReMI '09 Proceedings of the 3rd International Conference on Pattern Recognition and Machine Intelligence
Steganalysis of LSB based image steganography using spatial and frequency domain features
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Image processing algorithms employing two-dimensional Karhunen-Loeve Transform
Annales UMCS, Informatica
A new approach for data hiding in gray-level images
SPPRA '08 Proceedings of the Fifth IASTED International Conference on Signal Processing, Pattern Recognition and Applications
An application of linear mixed effects model to steganography detection
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
An Effective Message Embedding Scheme for 3D Models
Fundamenta Informaticae
Progressive randomization: Seeing the unseen
Computer Vision and Image Understanding
Performance comparison of DCT and Walsh transform for steganography
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Increased capacity for information hiding using Walsh transform
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Secret communication via image hiding in image by pixel value differencing
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
A new methodology for data coding and embedding for high-capacity transmitting
International Journal of Electronic Security and Digital Forensics
Journal of Visual Communication and Image Representation
Data hiding using run length matching
International Journal of Intelligent Information and Database Systems
A method for automatic identification of signatures of steganography software
IEEE Transactions on Information Forensics and Security
Classification of steganalysis techniques: A study
Digital Signal Processing
Secure steganography for audio signals
ISCGAV'10 Proceedings of the 10th WSEAS international conference on Signal processing, computational geometry and artificial vision
Interaction with objects inside a media space
ACM SIGGRAPH ASIA 2010 Posters
Hiding the hidden message: approaches to textual steganography
International Journal of Electronic Security and Digital Forensics
Hamiltonian graph approach to steganography
International Journal of Electronic Security and Digital Forensics
Proceedings of the 2011 International Conference on Communication, Computing & Security
A secure keyless image steganography approach for lossless RGB images
Proceedings of the 2011 International Conference on Communication, Computing & Security
Haptic annotation for an interactive image
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
A verifiable secret sharing scheme based on AMBTC
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
Multimedia Tools and Applications
A novel steganographic methodology for high capacity data hiding in executable files
International Journal of Internet Technology and Secured Transactions
Increased cover capacity using advanced multiple LSB algorithms
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Data hiding in gray-scale images using pixel value differencing
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
A framework for avoiding steganography usage over HTTP
Journal of Network and Computer Applications
A data hiding algorithm for point-sampled geometry
ICCSA'06 Proceedings of the 6th international conference on Computational Science and Its Applications - Volume Part I
High capacity and secured methodologies for steganography
International Journal of Electronic Security and Digital Forensics
KL-sense secure image steganography
International Journal of Security and Networks
Minimizing the statistical impact of LSB steganography
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
UniSpaCh: A text-based data hiding method using Unicode space characters
Journal of Systems and Software
Data hiding in identification and offset IP fields
ISSADS'05 Proceedings of the 5th international conference on Advanced Distributed Systems
Robust and secured image-adaptive data hiding
Digital Signal Processing
Watermarking essential data structures for copyright protection
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
An Effective Message Embedding Scheme for 3D Models
Fundamenta Informaticae
Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies
Fundamenta Informaticae
Hiding Message in Map Along Pre-Hamiltonian Path
International Journal of Information Security and Privacy
An Application Based on Steganography
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Feeling the unseen: physical interaction with depth-embedded images
CHI '13 Extended Abstracts on Human Factors in Computing Systems
Steganalysis for MP3Stego using differential statistics of quantization step
Digital Signal Processing
International Journal of Electronic Security and Digital Forensics
Wavelet-transform steganography: algorithm and hardware implementation
International Journal of Electronic Security and Digital Forensics
Hi-index | 4.10 |
Steganography is an ancient art of hiding information. Digital technology gives us new ways to apply steganographic techniques, including one of the most intriguing—that of hiding information in digital images.