Search Results

There are 15950 results for: content related to: Steganalysis of least significant bit matching using multi-order differences

  1. Pitch-based steganography for Speex voice codec

    Security and Communication Networks

    Artur Janicki

    Version of Record online : 3 FEB 2016, DOI: 10.1002/sec.1428

  2. A novel image steganography scheme based on morphological associative memory and permutation schema

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 110–121, Sara Nazari, Amir-Masoud Eftekhari-Moghadam and Mohammad-Shahram Moin

    Version of Record online : 12 FEB 2014, DOI: 10.1002/sec.962

  3. Adaptive least significant bit matching revisited with the help of error images

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 510–515, Masoud Afrakhteh and Jeong-A Lee

    Version of Record online : 12 MAR 2014, DOI: 10.1002/sec.998

  4. Color images steganalysis using rgb channel geometric transformation measures

    Security and Communication Networks

    Hasan Abdulrahman, Marc Chaumont, Philippe Montesinos and Baptiste Magnier

    Version of Record online : 4 FEB 2016, DOI: 10.1002/sec.1427

  5. Parallel modular steganography using error images

    Security and Communication Networks

    Volume 8, Issue 8, 25 May 2015, Pages: 1515–1524, Masoud Afrakhteh and Jeong-A Lee

    Version of Record online : 1 SEP 2014, DOI: 10.1002/sec.1100

  6. Image steganography and steganalysis

    Wiley Interdisciplinary Reviews: Computational Statistics

    Volume 3, Issue 3, May/June 2011, Pages: 251–259, Mayra Bachrach and Frank Y. Shih

    Version of Record online : 10 MAR 2011, DOI: 10.1002/wics.152

  7. You have free access to this content
    Universal steganography model for low bit-rate speech codec

    Security and Communication Networks

    Volume 9, Issue 8, 25 May 2016, Pages: 747–754, Shanyu Tang, Qing Chen, Wei Zhang and Yongfeng Huang

    Version of Record online : 10 FEB 2015, DOI: 10.1002/sec.1183

  8. Unified phase and magnitude speech spectra data hiding algorithm

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 961–971, Fatiha Djebbar, Beghdad Ayad, Karim Abed-Meraim and Habib Hamam

    Version of Record online : 11 JAN 2013, DOI: 10.1002/sec.644

  9. A formal model for the creation and evaluation of steganographic solutions based in lexical–semantic substitutions: a case applied to Spanish

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 813–832, Alfonso Muñoz, Irina Argüelles and Sergio Sánchez

    Version of Record online : 30 APR 2013, DOI: 10.1002/sec.782

  10. RAND - STEG: an integer wavelet transform domain digital image random steganography using knight's tour

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2374–2382, V. Thanikaiselvan and P. Arulmozhivarman

    Version of Record online : 23 JAN 2015, DOI: 10.1002/sec.1185

  11. Detection of Hidden Information, Covert Channels and Information Flows

    Standard Article

    Wiley Handbook of Science and Technology for Homeland Security

    Neil F. Johnson and Phil A. Sallee

    Published Online : 15 JUN 2009, DOI: 10.1002/9780470087923.hhs427

  12. Lost audio packets steganography: the first practical evaluation

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1394–1403, Wojciech Mazurczyk

    Version of Record online : 15 FEB 2012, DOI: 10.1002/sec.502

  13. On the undetectability of transcoding steganography

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 3804–3814, Artur Janicki, Wojciech Mazurczyk and Krzysztof Szczypiorski

    Version of Record online : 29 JUN 2015, DOI: 10.1002/sec.1301

  14. MDE-based image steganography with large embedding capacity

    Security and Communication Networks

    Volume 9, Issue 8, 25 May 2016, Pages: 721–728, Zhaoxia Yin and Bin Luo

    Version of Record online : 22 JUN 2015, DOI: 10.1002/sec.1275

  15. Matrix embedding in multicast steganography: analysis in privacy, security and immediacy

    Security and Communication Networks

    Volume 9, Issue 8, 25 May 2016, Pages: 791–802, Weiwei Liu, Guangjie Liu and Yuewei Dai

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1168

  16. On importance of steganographic cost for network steganography

    Security and Communication Networks

    Volume 9, Issue 8, 25 May 2016, Pages: 781–790, Wojciech Mazurczyk, Steffen Wendzel, Ignacio Azagra Villares and Krzysztof Szczypiorski

    Version of Record online : 8 AUG 2014, DOI: 10.1002/sec.1085

  17. Perfect undetectability of network steganography

    Security and Communication Networks

    Wojciech Frączek and Krzysztof Szczypiorski

    Version of Record online : 27 APR 2016, DOI: 10.1002/sec.1491

  18. Steganographic access control in data hiding using run-length encoding and modulo-operations

    Security and Communication Networks

    Volume 9, Issue 2, 25 January 2016, Pages: 139–148, Chin-Feng Lee, Chi-Yao Weng and Aneesh Sharma

    Version of Record online : 16 JUN 2011, DOI: 10.1002/sec.333

  19. Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics

    Security and Communication Networks

    Hui Tian, Yanpeng Wu, Chin-Chen Chang, Yongfeng Huang, Jin Liu, Tian Wang, Yonghong Chen and Yiqiao Cai

    Version of Record online : 2 FEB 2016, DOI: 10.1002/sec.1443

  20. Digital image steganalysis based on local textural features and double dimensionality reduction

    Security and Communication Networks

    Volume 9, Issue 8, 25 May 2016, Pages: 729–736, Fengyong Li, Xinpeng Zhang, Hang Cheng and Jiang Yu

    Version of Record online : 14 OCT 2014, DOI: 10.1002/sec.1094