Search Results

There are 4607 results for: content related to: Morphology, Thermal Stability, and Mechanical Behavior of [Poly(propylene)-grafted Maleic Anhydride]-Layered Expanded Graphite Oxide Composites

  1. You have full text access to this Open Access content
    HYSA: HYbrid steganographic approach using multiple steganography methods

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1173–1184, Hedieh Sajedi and Mansour Jamzad

    Version of Record online : 17 OCT 2010, DOI: 10.1002/sec.243

  2. You have full text access to this Open Access content
    Reversible secret image sharing with steganography and dynamic embedding

    Security and Communication Networks

    Volume 5, Issue 11, November 2012, Pages: 1267–1276, Wei-Tong Hu, Ming-Chu Li, Cheng Guo and Yi-Zhi Ren

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.567

  3. You have full text access to this Open Access content
    A novel image steganography scheme based on morphological associative memory and permutation schema

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 110–121, Sara Nazari, Amir-Masoud Eftekhari-Moghadam and Mohammad-Shahram Moin

    Version of Record online : 12 FEB 2014, DOI: 10.1002/sec.962

  4. You have full text access to this Open Access content
    Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1636–1647, Weiwei Liu, Guangjie Liu and Yuewei Dai

    Version of Record online : 15 SEP 2014, DOI: 10.1002/sec.1111

  5. You have full text access to this Open Access content
    A framework of adaptive steganography resisting JPEG compression and detection

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2957–2971, Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye and Fenlin Liu

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1502

  6. You have full text access to this Open Access content
    Unified phase and magnitude speech spectra data hiding algorithm

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 961–971, Fatiha Djebbar, Beghdad Ayad, Karim Abed-Meraim and Habib Hamam

    Version of Record online : 11 JAN 2013, DOI: 10.1002/sec.644

  7. You have full text access to this Open Access content
    Enhanced stego block chaining (ESBC) for low bandwidth channels

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 6239–6247, Sahib Khan, Muhammad Ismail, Tawab Khan and Nasir Ahmad

    Version of Record online : 16 JAN 2017, DOI: 10.1002/sec.1769

  8. You have full text access to this Open Access content
    Adaptive block-based pixel value differencing steganography

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5036–5050, Osama Hosam and Nadhir Ben Halima

    Version of Record online : 17 NOV 2016, DOI: 10.1002/sec.1676

  9. Image steganography and steganalysis

    Wiley Interdisciplinary Reviews: Computational Statistics

    Volume 3, Issue 3, May/June 2011, Pages: 251–259, Mayra Bachrach and Frank Y. Shih

    Version of Record online : 10 MAR 2011, DOI: 10.1002/wics.152

  10. You have full text access to this Open Access content
    Adaptive least significant bit matching revisited with the help of error images

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 510–515, Masoud Afrakhteh and Jeong-A Lee

    Version of Record online : 12 MAR 2014, DOI: 10.1002/sec.998

  11. You have full text access to this Open Access content
    MDE-based image steganography with large embedding capacity

    Security and Communication Networks

    Volume 9, Issue 8, 25 May 2016, Pages: 721–728, Zhaoxia Yin and Bin Luo

    Version of Record online : 22 JUN 2015, DOI: 10.1002/sec.1275

  12. You have full text access to this Open Access content
    Steganalysis of least significant bit matching using multi-order differences

    Security and Communication Networks

    Volume 7, Issue 8, August 2014, Pages: 1283–1291, Zhihua Xia, Xinhui Wang, Xingming Sun and Baowei Wang

    Version of Record online : 16 AUG 2013, DOI: 10.1002/sec.864

  13. You have full text access to this Open Access content
    Reversible data hiding exploiting high-correlation regulation for high-quality images

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1408–1421, Xing-Tian Wang, Ming-Chu Li, Szu-Ting Wang and Chin-Chen Chang

    Version of Record online : 27 AUG 2014, DOI: 10.1002/sec.1083

  14. You have full text access to this Open Access content
    Matrix embedding in multicast steganography: analysis in privacy, security and immediacy

    Security and Communication Networks

    Volume 9, Issue 8, 25 May 2016, Pages: 791–802, Weiwei Liu, Guangjie Liu and Yuewei Dai

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1168

  15. You have full text access to this Open Access content
    A high-capacity and secure least significant bit embedding approach based on word and letter frequencies

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5764–5788, Mohammad H. Alshayeji, Suood Abdulaziz Al-Roomi and Sa'ed Abed

    Version of Record online : 24 JAN 2017, DOI: 10.1002/sec.1735

  16. You have full text access to this Open Access content
    Text steganography: a novel character-level embedding algorithm using font attribute

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 6066–6079, Bala Krishnan Ramakrishnan, Prasanth Kumar Thandra and A. V. Satya Murty Srinivasula

    Version of Record online : 8 FEB 2017, DOI: 10.1002/sec.1757

  17. You have full text access to this Open Access content
    Color images steganalysis using rgb channel geometric transformation measures

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2945–2956, Hasan Abdulrahman, Marc Chaumont, Philippe Montesinos and Baptiste Magnier

    Version of Record online : 4 FEB 2016, DOI: 10.1002/sec.1427

  18. A discrete Gould transform data hiding scheme

    Mathematical Methods in the Applied Sciences

    Volume 37, Issue 2, 30 January 2014, Pages: 283–288, E.E. Varsaki, V. Fotopoulos and A.N. Skodras

    Version of Record online : 6 DEC 2013, DOI: 10.1002/mma.3041

  19. You have free access to this content
    A Model-Based Image Steganography Method Using Watson's Visual Model

    ETRI Journal

    Volume 36, Issue 3, June 2014, Pages: 479–489, Mohammad Fakhredanesh, Reza Safabakhsh and Mohammad Rahmati

    Version of Record online : 1 JUN 2014, DOI: 10.4218/etrij.14.0113.0171

  20. You have full text access to this Open Access content
    Digital image steganalysis based on local textural features and double dimensionality reduction

    Security and Communication Networks

    Volume 9, Issue 8, 25 May 2016, Pages: 729–736, Fengyong Li, Xinpeng Zhang, Hang Cheng and Jiang Yu

    Version of Record online : 14 OCT 2014, DOI: 10.1002/sec.1094