Protecting digital media content
Communications of the ACM
A new paradigm hidden in steganography
Proceedings of the 2000 workshop on New security paradigms
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
IEEE Transactions on Information Theory
Spread spectrum image steganography
IEEE Transactions on Image Processing
The capability of image in hiding a secret message
SSIP'06 Proceedings of the 6th WSEAS International Conference on Signal, Speech and Image Processing
An improvement of EMD embedding method for large payloads by pixel segmentation strategy
Image and Vision Computing
A novel steganographic algorithm using animations as cover
Decision Support Systems
Video steganography for confidential documents: integrity, privacy and version control
Proceedings of the 26th annual ACM international conference on Design of communication
High Capacity Data Hiding for Grayscale Images
Fundamenta Informaticae
Detecting steganography on a large scale
Crossroads
StegErmelc: A Novel DCT-Based Steganographic Method Using Three Strategies
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
LSB-Based Steganography Using Reflected Gray Code
IEICE - Transactions on Information and Systems
Reversible data hiding for high quality images using modification of prediction errors
Journal of Systems and Software
IEEE Transactions on Information Forensics and Security
Quantization Step Parity-based Steganography for MP3 Audio
Fundamenta Informaticae
A novel data hiding scheme based on modulus function
Journal of Systems and Software
Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector
Digital Signal Processing
Data hiding in images based on tolerable error range
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
Classification of steganalysis techniques: A study
Digital Signal Processing
Multi-party covert communication with steganography and quantum secret sharing
Journal of Systems and Software
A local variance-controlled reversible data hiding method using prediction and histogram-shifting
Journal of Systems and Software
Journal of Visual Communication and Image Representation
Journal of Visual Communication and Image Representation
An improved image data hiding method using two-layer embedment strategy
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II
Non-cryptographic methods for improving real time transmission security and integrity
Annales UMCS, Informatica - Security Systems
Analysis of parity assignment steganography in palette images
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Using image steganography for decryptor distribution
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Data hiding in identification and offset IP fields
ISSADS'05 Proceedings of the 5th international conference on Advanced Distributed Systems
Impersonator identification through dynamic fingerprinting
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Quantization Step Parity-based Steganography for MP3 Audio
Fundamenta Informaticae
High Capacity Data Hiding for Grayscale Images
Fundamenta Informaticae
A Novel Steganographic Method with Four-Pixel Differencing and Modulus Function
Fundamenta Informaticae
Implementation of Least Significant Bit Steganography and statistical steganalysis
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Secure transmission of authenticated messages using new encoding scheme and Steganography
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Human visual system based data embedding method using quadtree partitioning
Image Communication
A new scheme for covert communication via 3G encoded speech
Computers and Electrical Engineering
Journal of Systems and Software
Enriching undergraduate computer science curriculum with steganography examples
Journal of Computing Sciences in Colleges
Steganographic information hiding that exploits a novel file system vulnerability
International Journal of Security and Networks
International Journal of Electronic Security and Digital Forensics
Data hiding by an improved exploiting modification direction
Multimedia Tools and Applications
Hi-index | 0.00 |
For every clever method and tool being developed to hide information in multimedia data, an equal number of clever methods and tools are being developed to detect and reveal its secrets.