[PDF][PDF] Collaboro: a collaborative (meta) modeling tool

JLC Izquierdo, J Cabot - PeerJ Computer Science, 2016 - peerj.com
Motivation Scientists increasingly rely on intelligent information systems to help them in their
daily tasks, in particular for managing research objects, like publications or datasets. The …

[HTML][HTML] A survey on different feature extraction and classification techniques used in image steganalysis

J Babu, S Rangu, P Manogna - Journal of Information security, 2017 - scirp.org
Steganography is the process of hiding data into public digital medium for secret
communication. The image in which the secret data is hidden is termed as stego image. The …

A steganalysis classification algorithm based on distinctive texture features

BT Hammad, IT Ahmed, N Jamil - Symmetry, 2022 - mdpi.com
Steganography is the technique for secretly hiding messages in media such as text, audio,
image, and video without being discovered. Image is one of the most essential media for …

An analysis of alphabet-based techniques in text steganography

B Osman, A Yasin, MN Omar - Journal of Telecommunication …, 2016 - jtec.utem.edu.my
Steganography and cryptography are methods in information hiding. Cryptography
scrambles the secret message, whereas steganography conceals a secret message in a …

[PDF][PDF] Forensic analysis of video steganography tools

T Sloan, J Hernandez-Castro - PeerJ Computer Science, 2015 - peerj.com
Steganography is the art and science of concealing information in such a way that only the
sender and intended recipient of a message should be aware of its presence. Digital …

[PDF][PDF] Comparative Analysis of Images Based on Least Significant Bit (LSB) Steganography

FA Oladeji, O Awe, TO Aro, AA Afolorunso… - FUW Trends in …, 2020 - ftstjournal.com
Steganography helps to conceal information between the sender and intended recipient so
that others are not aware of the message presence, largely, it is to hide information. Digital …

[PDF][PDF] Low feature dimension in image steganographic recognition

IT Ahmed, N Jamil, BT Hammad - Indonesian Journal of Electrical …, 2022 - academia.edu
Steganalysis aids in the detection of steganographic data without the need to know the
embedding algorithm or the" cover" image. The researcher's major goal was to develop a …

Алгоритм встраивания и извлечения информации в неподвижные цифровые изображения стойкий к пассивным стегоаналитическим атакам

РХ Балтаев, ИВ Лунегов - Вопросы безопасности, 2016 - elibrary.ru
Предметом исследования являются стеганографические методы защиты информации.
Существуют два основных способа защиты передаваемой информации …

[PDF][PDF] A SURVEY OF IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT (LSB)

AWE Oluwayomi, OA OLUKIRAN, O AIYENKO… - bulletin.feccupit.ro
1 Department of Computer Science, University of Lagos, Lagos, Nigeria 2 Department of
Mathematical and Computing Sciences, KolaDaisi University, Ibadan, Nigeria 3Department …

خوارزمية تصنيف Steganalysis تعتمد على سمات نسيج مميزة

BT Hammad - uoanbar.edu.iq
Steganography is the technique for secretly hiding messages in media such as text, audio,
image, and video without being discovered. Image is one of the most essential media for …