Pit Stop for an Audio Steganography Algorithm Andreas Westfeld1, Jürgen Wurzer2, Christian Fabian2, and Ernst Piller2 1 Dresden University of Applied Sciences, Germany…
INTERNATIONAL JOURNAL OF SCIENTIFIC ENGINEERING RESEARCH, VOLUME 9, ISSUE 12, DECEMBER-2018 ISSN 2229-5518 IJSER © 2018 http:www.ijser.org 1 INTRODUCTION nformation plays…
126 CHAPTER 7 Steganography based on Random pixel selection 71 Introduction An ideal Steganography technique embeds data into images in a way that forms modified images which…
Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes Weiming Zhang1,2, Xinpeng Zhang1, and Shuozhong Wang1 1 School of Communication…
3948 IEEE TRANSACTIONS ON COMMUNICATIONS VOL 68 NO 7 JULY 2020 Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes Weixiang Li Weiming Zhang Li Li…
An Adaptive Steganographic Technique Based on Integer Wavelet Transform R o EI Safy Faculty of Engineering Benha University H H Zayed Faculty of Computers Benha University…
Steganographic Generative Adversarial Networks Denis Volkhonskiy1 Ivan Nazarov1 Evgeny Burnaev1 1Skolkovo Institute of Science and Technology Nobel street 3 Moscow Moskovskaya…
TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography Christopher Connolly Patrick Lincoln Ian Mason Vinod Yegneswaran [email protected] {lincoln…
Methods for Information Hiding in Open Social Networks Jędrzej Bieniasz Krzysztof Szczypiorski Warsaw University of Technology Warsaw Poland [email protected] [email protected]…
RESEARCH ARTICLE Extreme learning machine based optimal embedding location finder for image steganography Hayfaa Abdulzahra Atee1,2¤*, Robiah Ahmad2☯, Norliza Mohd Noor2☯,…