Search Results

There are 37991 results for: content related to: Image steganography and steganalysis

  1. A formal model for the creation and evaluation of steganographic solutions based in lexical–semantic substitutions: a case applied to Spanish

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 813–832, Alfonso Muñoz, Irina Argüelles and Sergio Sánchez

    Version of Record online : 30 APR 2013, DOI: 10.1002/sec.782

  2. Steganography and Steganalysis

    Machine Learning in Image Steganalysis

    Hans Georg Schaathun, Pages: 7–24, 2012

    Published Online : 22 AUG 2012, DOI: 10.1002/9781118437957.ch2

  3. The Steganalysis Problem

    Machine Learning in Image Steganalysis

    Hans Georg Schaathun, Pages: 245–262, 2012

    Published Online : 22 AUG 2012, DOI: 10.1002/9781118437957.ch14

  4. You have free access to this content
    Bibliography

    Machine Learning in Image Steganalysis

    Hans Georg Schaathun, Pages: 267–277, 2012

    Published Online : 22 AUG 2012, DOI: 10.1002/9781118437957.biblio

  5. Matlist: Mature linguistic steganography methodology

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 697–718, Abdelrahman Desoky

    Version of Record online : 25 MAY 2010, DOI: 10.1002/sec.208

  6. A novel image steganography scheme based on morphological associative memory and permutation schema

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 110–121, Sara Nazari, Amir-Masoud Eftekhari-Moghadam and Mohammad-Shahram Moin

    Version of Record online : 12 FEB 2014, DOI: 10.1002/sec.962

  7. HYSA: HYbrid steganographic approach using multiple steganography methods

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1173–1184, Hedieh Sajedi and Mansour Jamzad

    Version of Record online : 17 OCT 2010, DOI: 10.1002/sec.243

  8. Detection of Hidden Information, Covert Channels and Information Flows

    Standard Article

    Wiley Handbook of Science and Technology for Homeland Security

    Neil F. Johnson and Phil A. Sallee

    Published Online : 15 JUN 2009, DOI: 10.1002/9780470087923.hhs427

  9. A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1279–1290, Yao Shen, Liusheng Huang, Xiaorong Lu and Wei Yang

    Version of Record online : 11 AUG 2014, DOI: 10.1002/sec.1081

  10. A revision of the subgenus Stegana (s.s.) (Diptera, Drosophilidae) from mainland China

    Zoological Journal of the Linnean Society

    Volume 158, Issue 4, April 2010, Pages: 726–739, TONG LI, HUAZHI CAO, JIANJUN GAO and HONGWEI CHEN

    Version of Record online : 30 MAR 2010, DOI: 10.1111/j.1096-3642.2009.00575.x

  11. Steganalysis in the JPEG Domain

    Machine Learning in Image Steganalysis

    Hans Georg Schaathun, Pages: 107–129, 2012

    Published Online : 22 AUG 2012, DOI: 10.1002/9781118437957.ch8

  12. Molecular characterization and phylogenesis of Steganinae (Diptera, Drosophilidae) inferred by the mitochondrial cytochrome c oxidase subunit 1

    Medical and Veterinary Entomology

    Volume 22, Issue 1, March 2008, Pages: 37–47, D. OTRANTO, 1 J. R. STEVENS, 2 G. TESTINI, 1 C. CANTACESSI and 1 J. MÁCA 3

    Version of Record online : 31 MAR 2008, DOI: 10.1111/j.1365-2915.2008.00714.x

  13. Matrix embedding in multicast steganography: analysis in privacy, security and immediacy

    Security and Communication Networks

    Volume 9, Issue 8, 25 May 2016, Pages: 791–802, Weiwei Liu, Guangjie Liu and Yuewei Dai

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1168

  14. Pitch-based steganography for Speex voice codec

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2923–2933, Artur Janicki

    Version of Record online : 3 FEB 2016, DOI: 10.1002/sec.1428

  15. Future of the Field

    Machine Learning in Image Steganalysis

    Hans Georg Schaathun, Pages: 263–266, 2012

    Published Online : 22 AUG 2012, DOI: 10.1002/9781118437957.ch15

  16. A high-capacity and secure least significant bit embedding approach based on word and letter frequencies

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5764–5788, Mohammad H. Alshayeji, Suood Abdulaziz Al-Roomi and Sa'ed Abed

    Version of Record online : 24 JAN 2017, DOI: 10.1002/sec.1735

  17. Text steganography: a novel character-level embedding algorithm using font attribute

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 6066–6079, Bala Krishnan Ramakrishnan, Prasanth Kumar Thandra and A. V. Satya Murty Srinivasula

    Version of Record online : 8 FEB 2017, DOI: 10.1002/sec.1757

  18. Micro protocol engineering for unstructured carriers: on the embedding of steganographic control protocols into audio transmissions

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2972–2985, Matthias Naumann, Steffen Wendzel, Wojciech Mazurczyk and Joerg Keller

    Version of Record online : 17 JUN 2016, DOI: 10.1002/sec.1500

  19. Introduction

    Machine Learning in Image Steganalysis

    Hans Georg Schaathun, Pages: 1–6, 2012

    Published Online : 22 AUG 2012, DOI: 10.1002/9781118437957.ch1

  20. Color images steganalysis using rgb channel geometric transformation measures

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2945–2956, Hasan Abdulrahman, Marc Chaumont, Philippe Montesinos and Baptiste Magnier

    Version of Record online : 4 FEB 2016, DOI: 10.1002/sec.1427