X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (975) 975
Conference Proceeding (812) 812
Book Chapter (28) 28
Dissertation (15) 15
Magazine Article (15) 15
Government Document (3) 3
Book Review (2) 2
Standard (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
steganography (718) 718
lsb (700) 700
cryptography (255) 255
steganalysis (251) 251
psnr (206) 206
watermarking (189) 189
encryption (181) 181
engineering, electrical & electronic (174) 174
data hiding (162) 162
least significant bit (161) 161
information hiding (144) 144
lsb substitution (136) 136
computer science (131) 131
robustness (118) 118
security (110) 110
lsb matching (108) 108
algorithms (105) 105
computer science, information systems (104) 104
lsb steganography (87) 87
histograms (85) 85
image color analysis (82) 82
conferences (80) 80
信息隐藏 (77) 77
image coding (75) 75
image steganography (74) 74
pixel (72) 72
computer science, theory & methods (71) 71
payloads (70) 70
pixels (70) 70
image quality (67) 67
digital images (65) 65
computer science, software engineering (61) 61
data mining (61) 61
steganographie (59) 59
information security (58) 58
computer science, artificial intelligence (56) 56
receivers (56) 56
algorithm design and analysis (55) 55
computer communication networks (52) 52
discrete wavelet transforms (52) 52
distortion (52) 52
gray-scale (50) 50
media (50) 50
analysis (49) 49
encoding (48) 48
messages (47) 47
image edge detection (46) 46
feature extraction (45) 45
discrete cosine transforms (43) 43
lsb replacement (43) 43
embedding (42) 42
authentication (41) 41
digital watermarking (41) 41
internet (41) 41
aes (40) 40
audio steganography (40) 40
ciphers (40) 40
multimedia information systems (40) 40
color (39) 39
dct (39) 39
streaming media (39) 39
cover image (38) 38
scheme (37) 37
visualization (37) 37
lsb embedding (36) 36
mse (36) 36
lsb算法 (35) 35
transforms (35) 35
computer science, hardware & architecture (34) 34
dwt (34) 34
mathematical analysis (34) 34
隐写分析 (34) 34
special purpose and application-based systems (33) 33
engineering (32) 32
image processing (32) 32
stego image (32) 32
lsb technique (31) 31
computer information security (30) 30
educational institutions (30) 30
methods (30) 30
pvd (29) 29
stego-image (29) 29
telecommunications (29) 29
data security (28) 28
decoding (28) 28
rsa (28) 28
algorithm (27) 27
detectors (27) 27
data structures, cryptology and information theory (26) 26
decryption (26) 26
computer security (25) 25
signal to noise ratio (25) 25
discrete wavelet transform (24) 24
edge detection (24) 24
frequency-domain analysis (24) 24
image hiding (24) 24
imaging science & photographic technology (24) 24
steganographic method (24) 24
capacity (23) 23
humans (23) 23
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (1607) 1607
Chinese (205) 205
Indonesian (14) 14
Japanese (14) 14
Korean (9) 9
Portuguese (5) 5
Czech (3) 3
Spanish (3) 3
German (2) 2
Turkish (2) 2
Arabic (1) 1
Lithuanian (1) 1
Swedish (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Cybernetics and Information Technologies, ISSN 1314-4081, 03/2019, Volume 19, Issue 1, pp. 73 - 87
Achieving secured data transmission is not always an easy job. Secret data sharing requires confidentiality and Undetectability. Steganography is preferred... 
VoIP | LSB | PCM | QIM
Journal Article
Procedia computer science, ISSN 1877-0509, 2016, Volume 93, pp. 878 - 885
This paper is based on image steganography that is Least Significant Bits (LSB) techniques on images to enhance the security of the communication. The... 
Steganography | PSNR | LSB | MSE
Journal Article
Signal processing. Image communication, ISSN 0923-5965, 2019, Volume 70, pp. 233 - 245
Journal Article
Proceedings of SPIE - The International Society for Optical Engineering, ISSN 0277-786X, 2008, Volume 6819
Conference Proceeding
Journal Article
Pattern recognition, ISSN 0031-3203, 2004, Volume 37, Issue 3, pp. 469 - 474
In this paper, a data hiding scheme by simple LSB substitution is proposed. By applying an optimal pixel adjustment process to the stego-image obtained by the... 
Data hiding | LSB substitution | data hiding | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
Procedia Computer Science, ISSN 1877-0509, 2015, Volume 54, pp. 790 - 798
This paper introduces a new technique to increase the information security over the network using steganography in such a way that the secret message being... 
Steganography | LSB | Encryption | DKL | Decryption
Journal Article
Journal of Theoretical and Applied Information Technology, ISSN 1992-8645, 07/2018, Volume 96, Issue 13, pp. 4081 - 4091
Journal Article
Cybernetics and Information Technologies, ISSN 1311-9702, 06/2018, Volume 18, Issue 2, pp. 74 - 88
The Internet is a public network with many issues of data transfer security. Steganography is a data transmission security technique that is done by hiding the... 
Sobel | LSB | Image steganography | Hybrid edge detection | Canny
Journal Article
Displays, ISSN 0141-9382, 2016, Volume 42, pp. 36 - 42
•We proposed a novel method to embed a series of ternary secret data based on LSB.•The proposed scheme can hide two ternary numbers into each grayscale pixel,... 
LSB scheme | Modulo three strategy | Steganalysis | High embedding capacity
Journal Article
Cybernetics and Information Technologies, ISSN 1311-9702, 03/2018, Volume 18, Issue 1, pp. 69 - 80
This article proposes bit flipping method to conceal secret data in the original image. Here a block consists of 2 pixels and thereby flipping one or two LSBs... 
Steganography | Least Significant Bit (LSB) substitution | bit flipping | capacity | Bit flipping | Capacity
Journal Article
Guizhou ke xue, ISSN 1003-6563, 2015, Volume 33, Issue 3, pp. 15 - 18
TP309; 信息隐藏技术作为信息安全的一个重要部分,是当前信息安全领域的热点问题之一.当前主流的信息隐藏产品几乎都以软件的形式存在,对使用领域及环境有一定要求.本文通过研究高级加密标准(AES)与信息隐藏技术,提出一种基于AES密码体制的信息隐藏模块的硬件实现方式.并在Quartus硬件平台上用Verilog... 
Journal Article
Procedia Computer Science, ISSN 1877-0509, 2015, Volume 54, pp. 612 - 620
Now a day information security is the biggest issue of social network. there are numerous technique are available for image and data security, watermarking is... 
Correlation coefficient | watermarking | PSNR | LSB | SNR | Watermarking
Journal Article
Information Sciences, ISSN 0020-0255, 06/2012, Volume 193, pp. 115 - 124
Steganography’s role in secret communication extends from concealing information to communication. As one of several possible approaches to embed confidential... 
Inverted Pattern (IP) LSB | Space Filling Curves (SFCs) | Information hiding | Image steganography | LSB embedding | STEGANALYSIS | HIDING CAPACITY | ALGORITHM | COMPUTER SCIENCE, INFORMATION SYSTEMS | JPEG | STEGANOGRAPHIC METHOD | MODULUS FUNCTION | LSB SUBSTITUTION
Journal Article
Signal processing. Image communication, ISSN 0923-5965, 2018, Volume 65, pp. 46 - 66
This paper presents a literature review of image steganography techniques in the spatial domain for last 5 years. The research community has already done lots... 
Data hiding | Spatial domain steganography | Adaptive steganography | Image steganography | Digital spatial domain | Security | STEGANALYSIS | EDGE DETECTOR | CAPACITY | SUBSTITUTION | DIGITAL IMAGES | GENETIC ALGORITHM | ENGINEERING, ELECTRICAL & ELECTRONIC | REPLACEMENT | DATA HIDING SCHEME | LSB | LEAST-SIGNIFICANT-BIT | Computer science | Electrical engineering
Journal Article
World Academy of Science, Engineering and Technology, ISSN 2010-376X, 02/2009, Volume 38, pp. 1080 - 1087
Journal Article
通化师范学院学报, ISSN 1008-7974, 2016, Volume 37, Issue 6, pp. 9 - 11
文章首先介绍目前人群监测技术和存在的问题,提出基于LSB技术的人群聚集场所监测和预警的方法,并进行系统设计和流程跟踪.相比传统监测方法,基于LSB监测预警方法具有成本低、适用广、实时性强等优点. 
人群监测技术 | 预警 | LSB
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.