Search Results

There are 32637 results for: content related to: Image steganography and steganalysis

  1. A formal model for the creation and evaluation of steganographic solutions based in lexical–semantic substitutions: a case applied to Spanish

    Security and Communication Networks

    Volume 7, Issue 5, May 2014, Pages: 813–832, Alfonso Muñoz, Irina Argüelles and Sergio Sánchez

    Article first published online : 30 APR 2013, DOI: 10.1002/sec.782

  2. Detection of Hidden Information, Covert Channels and Information Flows

    Standard Article

    Wiley Handbook of Science and Technology for Homeland Security

    Neil F. Johnson and Phil A. Sallee

    Published Online : 15 JUN 2009, DOI: 10.1002/9780470087923.hhs427

  3. Biometric watermarks based on face recognition methods for authentication of digital images

    Security and Communication Networks

    Wioletta Wójtowicz and Marek R. Ogiela

    Article first published online : 14 OCT 2014, DOI: 10.1002/sec.1114

  4. Steganography and Steganalysis

    Machine Learning in Image Steganalysis

    Hans Georg Schaathun, Pages: 7–24, 2012

    Published Online : 22 AUG 2012, DOI: 10.1002/9781118437957.ch2

  5. Multimedia Content Watermarking

    Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies

    Mihai Mitrea, Françoise Prêteux, Pages: 149–201, 2010

    Published Online : 5 JAN 2010, DOI: 10.1002/9780470611883.ch5

  6. You have free access to this content
    Bibliography

    Machine Learning in Image Steganalysis

    Hans Georg Schaathun, Pages: 267–277, 2012

    Published Online : 22 AUG 2012, DOI: 10.1002/9781118437957.biblio

  7. Polygonal mesh watermarking using Laplacian coordinates

    Computer Graphics Forum

    Volume 29, Issue 5, July 2010, Pages: 1585–1593, Y. Yang and I. Ivrissimtzis

    Article first published online : 21 SEP 2010, DOI: 10.1111/j.1467-8659.2010.01767.x

  8. A novel watermarking method for software protection in the cloud

    Software: Practice and Experience

    Volume 42, Issue 4, April 2012, Pages: 409–430, Zhiwei Yu, Chaokun Wang, Clark Thomborson, Jianmin Wang, Shiguo Lian and Athanasios V. Vasilakos

    Article first published online : 23 MAY 2011, DOI: 10.1002/spe.1088

  9. 3D Object Watermarking

    3D Object Processing: Compression, Indexing and Watermarking

    Jihane Bennour, Jean-Luc Dugelay, Emmanuel Garcia, Nikos Nikolaidis, Pages: 139–183, 2008

    Published Online : 23 APR 2008, DOI: 10.1002/9780470510773.ch4

  10. An adaptive scheme for compressed video steganography using temporal and spatial features of the video signal

    International Journal of Imaging Systems and Technology

    Volume 19, Issue 4, December 2009, Pages: 306–315, Jafar Mansouri and Morteza Khademi

    Article first published online : 6 NOV 2009, DOI: 10.1002/ima.20207

  11. Digital Watermarking

    Standard Article

    Encyclopedia of Imaging Science and Technology

    R. Chandramouli, Nasir Memon and Majid Rabbani

    Published Online : 15 JAN 2002, DOI: 10.1002/0471443395.img010

  12. Real-time audio steganography attack based on automatic objective quality feedback

    Security and Communication Networks

    Qilin Qi, Aaron Sharp, Dongming Peng and Hamid Sharif

    Article first published online : 30 OCT 2014, DOI: 10.1002/sec.1150

  13. Matlist: Mature linguistic steganography methodology

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 697–718, Abdelrahman Desoky

    Article first published online : 25 MAY 2010, DOI: 10.1002/sec.208

  14. Protection of Color Images

    Digital Color

    William Puech, Alain Trémeau, Philippe Carré, Pages: 227–264, 2013

    Published Online : 6 MAR 2013, DOI: 10.1002/9781118562680.ch8

  15. Text split-based steganography in OOXML format documents for covert communication

    Security and Communication Networks

    Volume 5, Issue 9, September 2012, Pages: 957–968, Zhangjie Fu, Xingming Sun, Yuling Liu and Bo Li

    Article first published online : 19 OCT 2011, DOI: 10.1002/sec.378

  16. Stepwise inter-frame correlation-based steganalysis system for video streams

    Security and Communication Networks

    Volume 1, Issue 6, November/December 2008, Pages: 487–494, Bin Liu, Fenlin Liu and Chunfang Yang

    Article first published online : 21 NOV 2008, DOI: 10.1002/sec.84

  17. Lattice Costa schemes using subspace projection for digital watermarking

    European Transactions on Telecommunications

    Volume 15, Issue 4, July/August 2004, Pages: 351–361, Robert F. H. Fischer, Roman Tzschoppe and Robert Bäuml

    Article first published online : 13 AUG 2004, DOI: 10.1002/ett.985

  18. An Efficient Information Hiding Algorithm for Polygon Models

    Computer Graphics Forum

    Volume 24, Issue 3, September 2005, Pages: 591–600, Chung-Ming Wang and Yu-Ming Cheng

    Article first published online : 7 OCT 2005, DOI: 10.1111/j.1467-8659.2005.00884.x

  19. HYSA: HYbrid steganographic approach using multiple steganography methods

    Security and Communication Networks

    Volume 4, Issue 10, October 2011, Pages: 1173–1184, Hedieh Sajedi and Mansour Jamzad

    Article first published online : 17 OCT 2010, DOI: 10.1002/sec.243

  20. Watermarking on CNN-UM for image and video authentication

    International Journal of Circuit Theory and Applications

    Volume 32, Issue 6, November/December 2004, Pages: 591–607, M. E. Yalçın, J. Vandewalle, P. Arena, A. Basile and L. Fortuna

    Article first published online : 12 NOV 2004, DOI: 10.1002/cta.297