wwwtjprcorg [email protected] ROBUST AND SECURE PIXEL DOMAIN DIGITAL IMAGE STEGAN OGRAPHY ANU BINNY 1 R N DUCHE2 KOILAKUNTLA MADDULETY 3 1Research Scholar Electronics Dr K…
Mohaisen and Morad Iraqi Journal of Science 2016 Special Issue Part A pp:112-128 ____________________________ *Email: [email protected] 112 Secure Information Using Steganography…
International Journal of Emerging Trends Technology in Computer Science IJETTCS Web Site: www.ijettcs.org Email: [email protected] Volume 3, Issue 5, September-October 2014…
Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram Neeta Nain Jaideep Singh Ishan Dayma Rajesh Meena The authors are with Department…
ČESKÉ VYSOKÉ UČENÍ TECHNICKÉ V PRAZE Fakulta jaderná a fyzikálně inženýrská Katedra matematiky MINIMALIZACE VLIVU VLOŽENÉ INFORMACE VE STEGANOGRAFII…
International Journal of Research in Advent Technology Special Issue March 2019 E-ISSN: 2321-9637 Available online at wwwijratorg 80 Study of Different Image Steganography…
Unitary Embedding for Data Hiding with the SVD Clifford Bergman and Jennifer Davidson Department of Mathematics, Iowa State University, Ames Iowa, USA ABSTRACT Steganography…
Steganography Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis Commercial Steganograhic…
Sign In My ResearcherID My Citation Alerts My Saved Searches Log Out Help Search Search History Marked List 0 ALL DATABASES Please give us your feedback on using ISI Web…