Search Results - "steganography"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 124
- Security measures 91
- Data encryption (Computer science) 81
- Computer networks 71
- Cryptography 51
- Data protection 50
- Artificial intelligence 42
- Multimedia systems 32
- Computer science 30
- Digital watermarking 28
- Image processing 27
- Information technology 26
- Computational intelligence 17
- Computer crimes 16
- Computer vision 16
- Digital techniques 15
- Data processing 13
- Machine learning 13
- Internet 12
- Investigation 12
- Signal processing 11
- Big data 10
- Computers 10
- Examinations 10
- Internet of things 10
- Soft computing 9
- Watermarks 9
- Data mining 8
- Database management 7
- Digital forensic science 7
-
441
Eighth International Conference on Graphic and Image Processing (ICGIP 2016) : 29-31 October 2016, Tokyo, Japan /
Published 2017Table of Contents: “…Guoqiang Zhong -- Image steganography using layered pixel-value differencing …”
Full Text (via SPIE Digital Library)
Conference Proceeding eBook -
442
Information processing and management International Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, Kerala, India, March 2...
Published 2010Table of Contents: “…Image segmentaion and steganography for secured information transmission / …”
Full Text (via Springer)
Electronic Conference Proceeding eBook -
443
Cyber space and outer space security /
Published 2024Table of Contents: “…cryptography 223 9.3.7 Steganography 223 9.4 Post-quantum Signature Generation …”
Full Text (via Taylor & Francis)
eBook -
444
Recent Trends in Computational Intelligence and Its Application : Proceedings of the 1st International Conference on Recent Trends in Information Technology and its Application (IC...
Published 2023Table of Contents: “…Network Based Image Steganography 321Lijetha C. Jaffrin, P. N. Karthikayan, …”
Full Text (via Taylor & Francis)
eBook -
445
Intelligent computing, networking, and informatics proceedings of the International Conference on Advanced Computing, Networking, and Informatics, India, June 2013 /
Published 2014Table of Contents: “…novel approach to text steganography using font size of invisible space characters …”
Full Text (via Springer)
Electronic Conference Proceeding eBook