Search

Your search keyword '"Information Hiding"' showing total 9,472 results

Search Constraints

Start Over You searched for: Descriptor "Information Hiding" Remove constraint Descriptor: "Information Hiding"
9,472 results on '"Information Hiding"'

Search Results

51. Secure Data Hiding in Binary Images Using Run-Length Pairs

52. A Comparative Review on Image Interpolation-Based Reversible Data Hiding

54. Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas

55. Federated Learning for the Efficient Detection of Steganographic Threats Hidden in Image Icons

56. Information Hiding Method for Multi-channel Flexible Sensors

57. A Comprehensive Review on Deep Learning-Based Generative Linguistic Steganography

58. Combined Cryptography and Text Steganography for Enhanced Security Based on Number System

59. Coverless Information Hiding: A Review

61. Secure Image Steganography Approach for Hiding Compressed Data

62. Information Hiding in Space Data Link Protocols Based on Spare Value of Fields in Frame Header

63. Steganographer identification of JPEG image based on feature selection and graph convolutional representation

64. On Building Self-Complementary Codes and Their Application in Information Hiding.

65. Construction of small confusion component based on logarithmic permutation for hybrid information hiding scheme.

66. Enhancing of coverless image steganography capacity based on image block features.

67. A novel technique for fingerprint template security in biometric authentication systems.

68. The Influence of Steganographic Methods and QR Code Resolutions on Data Hiding in Cover Images.

69. Deep learning approach and cover image transportation: a multi-security adaptive image steganography scheme.

70. Novel Scheme for Data Hiding in Binary Images using Cover Pattern Histogram.

71. Text Steganography Techniques: A Review.

72. Deep learning based-approach for quick response code verification.

73. Sine cosine bird swarm algorithm-based deep convolution neural network for reversible medical video watermarking.

74. Review on various image protection methods.

76. Image encryption algorithm based on reversible information hiding and physical chaos in images

77. A federated approach for detecting data hidden in icons of mobile applications delivered via web and multiple stores.

78. Securing encrypted image information in audio data.

79. Linear Feedback Shift Registers-Based Randomization for Image Steganography.

80. The impact of retailer's demand information sharing strategies on manufacturer encroachment.

81. Topic Controlled Steganography via Graph-to-Text Generation.

82. 基于特征选择和图卷积表示的 JPEG 图像隐写者识别.

83. Steganography in Audio Files – COTS Software Analysis

84. Research on multi-address time-based blockchain covert communication method

85. Steganalysis of JPEG images using non-linear residuals

86. Secured Gray-Code-Based Steganographic Technique in Geometrical-Based Domain

87. How Novices and Experts Understand Hierarchies in Business Process Modeling.

89. Robust Video Watermarking Using Normalized Zernike Moments

90. 3D-HEVC Deep Video Information Hiding and Secure Transmission Method

91. A New Hybrid Chaotic Map-Based Image Steganography Using Spectral Graph Wavelet

92. Introducing AV1 Codec-Level Video Steganography

93. Computational Holographic Displays and Their Application in the Printing Industry

94. An Embedding Carrier-Free Steganography Method Based on Wasserstein GAN

96. Steganography Algorithm for Voice Transmission in VHF Band

97. Image Steganography Using Ridgelet Transform and SVD

98. A new method for hiding a secret file in several WAV files depends on circular secret key

99. Large-capacity information hiding scheme based on minimum pixel modification

100. Systematic literature review and analysis for Arabic text steganography method practically

Catalog

Books, media, physical & digital resources