X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (4911) 4911
Conference Proceeding (3945) 3945
Book / eBook (421) 421
Dissertation (206) 206
Book Chapter (164) 164
Publication (115) 115
Newspaper Article (83) 83
Magazine Article (46) 46
Government Document (38) 38
Reference (11) 11
Paper (7) 7
Journal / eJournal (5) 5
Trade Publication Article (4) 4
Book Review (3) 3
Data Set (2) 2
Newsletter (2) 2
Transcript (2) 2
Web Resource (2) 2
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
steganography (7927) 7927
cryptography (1889) 1889
steganalysis (1201) 1201
images (1150) 1150
algorithms (1076) 1076
computer science (1039) 1039
security (979) 979
watermarking (950) 950
engineering, electrical & electronic (933) 933
information hiding (892) 892
data hiding (780) 780
computer science, information systems (764) 764
encryption (716) 716
messages (610) 610
steganographie (575) 575
robustness (553) 553
computer science, theory & methods (532) 532
information security (518) 518
psnr (477) 477
computer science, software engineering (469) 469
computer security (460) 460
computer communication networks (453) 453
computer information security (451) 451
internet (447) 447
distortion (434) 434
cryptanalysis (429) 429
cryptology (429) 429
image steganography (422) 422
image coding (419) 419
secret writing (418) 418
data encryption (394) 394
payloads (389) 389
data mining (369) 369
histograms (369) 369
pixels (368) 368
data security (358) 358
computers (357) 357
discrete cosine transforms (353) 353
authentication (347) 347
image quality (344) 344
lsb (340) 340
telecommunications (319) 319
analysis (313) 313
pixel (313) 313
feature extraction (312) 312
protection (311) 311
image processing (293) 293
conferences (289) 289
embedding (282) 282
digital images (279) 279
criptografía (273) 273
multimedia information systems (267) 267
encoding (266) 266
receivers (265) 265
electronic books (255) 255
methods (255) 255
discrete wavelet transforms (245) 245
data encapsulation (244) 244
kryptologie (242) 242
data structures, cryptology and information theory (239) 239
decoding (236) 236
special purpose and application-based systems (236) 236
security measures (233) 233
transform coding (232) 232
color (229) 229
multimedia (229) 229
computer science, artificial intelligence (217) 217
image compression (210) 210
image color analysis (204) 204
texts (202) 202
mathematical analysis (197) 197
cyber security (196) 196
cybersecurity (196) 196
data encoding (195) 195
encryption of data (195) 195
computer systems (194) 194
mathematics (192) 192
information technology (191) 191
quantization (191) 191
computer system security (190) 190
algorithm design and analysis (189) 189
computer privacy (189) 189
electronic digital computers (189) 189
protection of computer systems (189) 189
security of computer systems (189) 189
least significant bit (186) 186
media (185) 185
ciphers (184) 184
signal processing (184) 184
mathematical models (182) 182
engineering (179) 179
jpeg (174) 174
statistics (174) 174
channels (173) 173
scheme (171) 171
humans (166) 166
cryptographie (165) 165
multi-user (165) 165
data protection (161) 161
audio steganography (160) 160
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (59) 59
UofT at Mississauga - Stacks (59) 59
Engineering & Comp. Sci. - Stacks (47) 47
Mathematical Sciences - Stacks (30) 30
UofT at Scarborough - Stacks (24) 24
Trinity College (John W Graham) - Stacks (23) 23
Collection Dvlpm't (Acquisitions) - Vendor file (22) 22
Gerstein Science - Stacks (18) 18
St. Michael's College (John M. Kelly) - 2nd Floor (14) 14
Online Resources - Online (11) 11
UTL at Downsview - May be requested (11) 11
Collection Dvlpm't (Acquisitions) - Closed Orders (10) 10
Engineering & Comp. Sci. - Missing (4) 4
Victoria University E.J. Pratt - Stacks (4) 4
Mathematical Sciences - Missing (3) 3
Engineering & Comp. Sci. - Periodical Stacks (2) 2
Law (Bora Laskin) - Stacks (2) 2
Engineering & Comp. Sci. - May be requested in 6-10 wks (1) 1
Physics - Stacks (1) 1
Robarts - Not Returned (1) 1
Royal Ontario Museum - Stacks (1) 1
Thomas Fisher Rare Book - Rare Book (1) 1
Trinity College (John W Graham) - Storage (1) 1
University College (Laidlaw) - Stacks (1) 1
UofT Schools - Special Collections (1) 1
UofT Schools - Stacks (1) 1
UofT at Mississauga - Periodical Stacks (1) 1
UofT at Mississauga - Reference (1) 1
UofT at Scarborough - Circulation Desk (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (8805) 8805
Chinese (313) 313
Japanese (106) 106
Korean (34) 34
Spanish (29) 29
Turkish (18) 18
German (14) 14
Indonesian (11) 11
Russian (9) 9
Arabic (8) 8
Czech (6) 6
French (6) 6
Portuguese (5) 5
Latvian (3) 3
Polish (3) 3
Romanian (3) 3
Croatian (2) 2
Italian (2) 2
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Signal Processing, ISSN 0165-1684, 2010, Volume 90, Issue 3, pp. 727 - 752
Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. It comes under... 
Frequency domain | Adaptive steganography | Spatial domain | Security | Digital image steganography | STEGANALYSIS | BREAKING | ALGORITHM | JPEG | ENGINEERING, ELECTRICAL & ELECTRONIC | SCHEME | WATERMARKING | COLOR | SECURE | Steganography | State of the art | Image processing | Watermarking | Images | Standards | Guidelines
Journal Article
OPTICS EXPRESS, ISSN 1094-4087, 10/2017, Volume 25, Issue 22, pp. 26581 - 26590
When two signals having overlapping frequency content are received at the same time, they interfere to obstruct detection of the information carried by each... 
STEGANOGRAPHY | MICROWAVE | OPTICS
Journal Article
2008, 2nd ed., The Morgan Kaufmann series in multimedia information and systems, ISBN 0123725852, xxviii, 593
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to... 
Computer security | Data protection | Digital watermarking | Applications of Computing
Book
Signal Processing: Image Communication, ISSN 0923-5965, 07/2018, Volume 65, pp. 46 - 66
This paper presents a literature review of image steganography techniques in the spatial domain for last 5 years. The research community has already done lots... 
Data hiding | Spatial domain steganography | Adaptive steganography | Image steganography | Digital spatial domain | Security | STEGANALYSIS | EDGE DETECTOR | CAPACITY | SUBSTITUTION | DIGITAL IMAGES | GENETIC ALGORITHM | ENGINEERING, ELECTRICAL & ELECTRONIC | REPLACEMENT | DATA HIDING SCHEME | LSB | LEAST-SIGNIFICANT-BIT | Computer science | Electrical engineering
Journal Article
Journal of King Saud University - Computer and Information Sciences, ISSN 1319-1578, 05/2019
In linguistic steganography, languages’ features are employed to hide information. The Arabic language has a rich set of features which have not been utilized... 
Steganography | Arabic calligraphy | Linguistic steganography | Arabic text steganography | Information hidden
Journal Article
1997, CRC Press series on discrete mathematics and its applications, ISBN 0849385237, xxviii, 780
Book
Wangji Wanglu Jishu Xuekan = Journal of Internet Technology, ISSN 1607-9264, 03/2018, Volume 19, Issue 2, p. 599
Information hiding is an evolving and challenging research field. Lately, a novel information hiding method that utilizes the original cover without... 
Steganography
Journal Article
1997, CRC Press series on discrete mathematics and its applications, ISBN 0849385237, xxviii, 780
Book
IEEE Transactions on Image Processing, ISSN 1057-7149, 10/2018, Volume 27, Issue 10, pp. 5087 - 5099
Journal Article
Computer Science Review, ISSN 1574-0137, 11/2014, Volume 13-14, Issue C, pp. 95 - 113
Steganography and steganalysis are the prominent research fields in information hiding paradigm. Steganography is the science of invisible communication while... 
Information hiding | Image steganography | Steganalysis | Image quality measures | Multimedia | Image quality | Steganography | Messages | Transforms | Images | Texts | Digital | Computer information security
Journal Article
Journal of Computer Science, ISSN 1549-3636, 2018, Volume 14, Issue 9, pp. 1247 - 1266
Journal Article
by Swain and Gandharba
06/2019, ISBN 9781522575160, 210
In the last few decades, the use of the Internet has grown tremendously, and the use of online communications has grown even more. The lack of security in... 
Image steganography
eBook
Procedia Computer Science, ISSN 1877-0509, 2015, Volume 70, pp. 764 - 768
Steganography is a technology used since years for the communication of messages secretly. These secret messages are put inside honest carriers. Carriers can... 
Protocol Steganography | Cryptography | Network Steganography
Journal Article
Nonlinear Dynamics, ISSN 0924-090X, 05/2016, Volume 84, Issue 3, pp. 1431 - 1446
This paper presents a novel layering approach of steganography which implements deception theory by utilizing three types of multimedia, in order to hide the... 
Gingerbreadman map | Chaos theory | Audio steganography | Layered steganography | Video steganography | Nonlinearity | Silence intervals of audio | Chaotic maps | ENGINEERING, MECHANICAL | SCHEME | MECHANICS | ENCRYPTION ALGORITHM | IMAGE | DIGITAL WATERMARKING | STANDARD | Wavelet transforms | Multimedia | Onions | Layering | Deception | Images | Encryption | Security | Steganography | Silence | Algorithms | Audio data | Feature extraction | Hides | Matlab
Journal Article
Security and Communication Networks, ISSN 1939-0114, 05/2016, Volume 9, Issue 8, pp. 781 - 790
Journal Article
2017, ISBN 0691141754, xiv, 373 pages
"The Mathematics of Secrets takes readers on a tour of the mathematics behind cryptography--the science of sending secret messages. Joshua Holden shows how... 
Ciphers | Mathematics | Cryptography | Computer security | Cryptography -- Mathematics
Book
Procedia Computer Science, ISSN 1877-0509, 2016, Volume 93, pp. 878 - 885
This paper is based on image steganography that is Least Significant Bits (LSB) techniques on images to enhance the security of the communication. The... 
Steganography | PSNR | LSB | MSE
Journal Article