We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 8,236 results
  1. Coverless Information Hiding: A Review

    The fast growth of digital multimedia technology and computer networks in recent years has aided the advancement of information hiding. The hidden...
    Nitin Kanzariya, Dhaval Jadhav, ... Lokesh Gagani in Proceedings of International Conference on Computational Intelligence
    Conference paper 2023
  2. An ensemble-based stegware detection system for information hiding malware attacks

    Information hiding techniques like steganography are used by hackers to obfuscate malicious attack codes to carry malware scripts and deliver to...

    Article 24 February 2023
  3. Information Hiding Method for Multi-channel Flexible Sensors

    Information hiding is one of the most critical techniques in information security. The goal of this task is to encrypt the maximum number of digits...
    Conference paper 2023
  4. Information Security Vulnerabilities Using Steganography as the Art of Hiding Information

    Due to advances in technological tools, most of the information is kept electronically and because of this information security has become a...
    Javier Guaña-Moya, Yolanda Borja-López, ... Oswaldo Basurto-Guerrero in Information Technology and Systems
    Conference paper 2024
  5. A Blind and High-Capacity Data Hiding Scheme for Medical Information Security

    How to guarantee the confidentiality of sensitive data communicated over the Internet and restrict access to designated information is today’s key...

    Moad Med Sayah, Zermi Narima, ... Kafi Med Redouane in Circuits, Systems, and Signal Processing
    Article 28 May 2024
  6. Information hiding in proposed 10.6 kbps CS-ACELP based speech codec using Quantization Index Modulation

    This paper aims to propose information hiding with the variant like steganography and watermarking in proposed 10.6 kbps Conjugate...

    Nikunj Tahilramani, Ninad Bhatt in International Journal of Speech Technology
    Article 03 December 2021
  7. GAN-based patient information hiding for an ECG authentication system

    Various biometrics such as the face, irises, and fingerprints, which can be obtained in a relatively simple way in modern society, are used in...

    Youngshin Kang, Geunbo Yang, ... Cheolsoo Park in Biomedical Engineering Letters
    Article 24 March 2023
  8. Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceeding of the 18th IIH-MSP 2022 Kitakyushu, Japan, Volume 1

    This book presents selected papers from the 18th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in...

    Shaowei Weng, Chin-Shiuh Shieh, George A. Tsihrintzis in Smart Innovation, Systems and Technologies
    Conference proceedings 2023
  9. Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceeding of the 18th IIH-MSP 2022 Kitakyushu, Japan, Volume 2

    The book presents selected papers from the 18th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, held on...

    Kazuhiro Kondo, Mong-Fong Horng, ... Pei Hu in Smart Innovation, Systems and Technologies
    Conference proceedings 2023
  10. Secure management of DICOM images via reversible data hiding, contrast enhancement and visible-imperceptible watermarking

    Purpose

    This paper proposes a novel algorithm that fuses visible-imperceptible watermarking and reversible data hiding with contrast enhancement to...

    Diana Nuñez-Ramirez, Eduardo Fragoso-Navarro, ... Manuel Cedillo-Hernandez in Health and Technology
    Article 15 April 2024
  11. A visual meaningful encryption and hiding algorithm for multiple images

    To protect the privacy of multiple images simultaneously in the digital information era, this paper proposes a novel multi-image encryption and...

    Guodong Ye, Liming Guo in Nonlinear Dynamics
    Article 08 June 2024
  12. Steganographic Approaches for Carrier Related Information Hiding

    In this paper we’ll define new steganographic techniques for information hiding, which depend on the carrier. In traditional steganographic solutions...
    Marek R. Ogiela, Urszula Ogiela in Complex, Intelligent and Software Intensive Systems
    Conference paper 2022
  13. Enhancing Information Security for Text-Based Data Hiding Using Midpoint Folding Approach: A Comparative Analysis

    The activity of concealing information or data within a carrier entity in a way that is difficult for unauthorized users to notice is known as...
    Sachin Allwadhi, Kamaldeep Joshi, Ashok Kumar Yadav in Mobile Radio Communications and 5G Networks
    Conference paper 2024
  14. Hiding patient information in medical images: an enhanced dual image separable reversible data hiding algorithm for E-healthcare

    E-healthcare requires communication of patient report to a specialized doctor in a real time scenario. Therefore, any harm to patient medical data...

    Article 27 May 2021
  15. Applied Steganographic System for Hiding Textual Information on Audio Files

    The article presents an applied steganographic system of hiding textual information in audio files on the basic of an advanced approach that combines...
    Serhii Buchyk, Serhii Toliupa, ... Yurii Serpinskyi in Emerging Networking in the Digital Transformation Age
    Conference paper 2023
  16. Network Lossless Information Hiding Communication Method Based on Big Data

    With the rapid development of China’s economy, information technology came into being under the economic development. The shadow of the information...
    Conference paper 2023
  17. A Two Fold Secure Cover Synthesis Based Data Hiding Approach by Generating Sequences

    Data hiding refers to the practice of concealing confidential information within seemingly innocent data with an objective to ensure the presence of...

    Anandaprova Majumder, Sumana Kundu, ... Suvamoy Changder in Wireless Personal Communications
    Article 28 July 2023
  18. ASCII Strip-Based Novel Approach of Information Hiding in Frequency Domain

    Image steganography is used for hiding secret information as well as for copyright protection. A new approach for information hiding or copyright...
    Ravi Saini, Gaurav Kumar, ... Rainu Nandal in Intelligent Data Analytics in Business
    Conference paper 2023
  19. Processing of Natural Language Information Hiding Algorithm Based on Machine Learning

    With the rapid improvement of the Internet, the use of the Internet and daily business activities have become part of people’s lives. An open network...
    Conference paper 2023
Did you find what you were looking for? Share feedback.