Keywords = Steganography
Number of Articles: 19
An Improved Method for Combine (LSB and MSB) Based on Color Image RGB
Volume 39, 1B , March 2021, , Page 231-242
Abstract
Image steganography is the art of hiding data into an image by using the secret key. This paper presents two techniques that combine the most significant bit (MSB) as well as the least ... Read More ...A New Proposed Coding Method for Steganography Purpose
Volume 39, 1B , March 2021, , Page 243-251
Abstract
Transferring data in a safe way is one of the things that have been of interest since ancient times. Data hiding or steganography is a method used to protect the data during its transmission. ... Read More ...Improvement of Image Steganography Using Discrete Wavelet Transform
Volume 38, 1A , January 2020, , Page 83-87
Abstract
Recently the Discrete-Wavelet-Transform (DWT) has been represented as signal processing powerful tool to separate the signal into its band frequency components. In this paper, improvement ... Read More ...Hiding 9 Gray Images In RGB Image and Using Filters For Noise Removing
Volume 36, 11A , November 2018, , Page 1144-1147
Abstract
This paper shows two major techniques, the first is steganography and the second is filters. Gaussian and median filters are used to enhance the quality of image and remove the noise. ... Read More ...Information Hiding Using Geographic Information System (GIS) Vector File
Volume 35, 2B , February 2017, , Page 182-188
Abstract
There are different techniques for securing data like cryptography and information hiding (steganography and watermarking) which has received more attention and faced many challenges. ... Read More ...A New Algorithm for a Steganography System
Volume 33, 8A , October 2015, , Page 1955-1970
Abstract
Steganography is the workmanship and study of concealing mystery information to provide a safe communication between two parties.This paper,displays othersteganographic algorithms for ... Read More ...Using a Parser for Steganography Purpose
Volume 33, 4B , April 2015, , Page 654-667
Abstract
Steganography techniques or information hiding are concerned with hiding the existence of data in other cover media. Usually one hiding method is used to hide secret data in a cover ... Read More ...Text Hiding Using Artificial Neural Networks
Volume 30, Issue 20 , December 2012, , Page 3553-3564
Abstract
The growth of information technology and data transfer led to increase the data attacks, so that information security becomes an important issue to keep the data saved during information ... Read More ...Hiding Encrypted Color Image within MPEG-2 Video
Volume 30, Issue 4 , February 2012, , Page 605-614
Abstract
In any communication, security is the most important issue in today’s world. Lots of data security and data hiding algorithms have been developed in the last decade. Hiding data ... Read More ...Color Images Hiding Based on Wavelet Based Fusion
Volume 29, Issue 15 , November 2011, , Page 3158-3171
Abstract
At present, information is being communicated and proceeds automatically on a large scale. Hence, the required measures for secure storage and transporting of the information are increased. ... Read More ...Steganograhy in Images by Using Intersecting Planes
Volume 29, Issue 7 , May 2011, , Page 1265-1275
Abstract
Steganography is the art of hiding, and transmitting information using apparently innocent carrier without expose any suspicion. In this paper the proposed system is an implementation ... Read More ...Watermarking in WAV Files Bases on Phase Coding
Volume 29, Issue 4 , March 2011, , Page 770-780
Abstract
The growth of the network multimedia open the illegal ways for users to use the digital media without any hindrance or control. This state created, the need for the copyright protection ... Read More ...Using B+ Tree To Represent Secret Messages For Steganography Purpose
Volume 28, Issue 15 , July 2010, , Page 5102-5112
Abstract
In this research we suggest a new approach by using B+ tree for storing the secret massages (that want to be sent) in a manner that prevent redundancy of these massages or even sub ... Read More ...A New Algorithm for Less Distortion and High Capacity Steganography Model Using Blocks-Based Method
Volume 28, Issue 13 , June 2010, , Page 2592-2607
Abstract
Most steganography methods suffer from many problems that effect ontheir efficiency and performance. Some of these are the capacity of cover media,the distortion of cover media, and ... Read More ...Design and Implementation of Secure Public Key Steganography
Volume 28, Issue 3 , January 2010, , Page 431-444
Abstract
Several approaches and techniques have been proposed to makecommunication via the internet secure; one of these approaches is steganography.Steganography is the art and science of hiding ... Read More ...Using Fractals in Information Hiding
Volume 27, Issue 16 , December 2009, , Page 3093-3111
Abstract
Fractals are generated by simple, recursive calculations. Encryption anddecryption algorithms that take advantage of fractals are developed. This paper presents a new approach for information ... Read More ...Effect of Dual Reinforcement on Wear Resistance by Aluminum Compacts Reinforce by SiC, Al2O3
Volume 27, Issue 13 , September 2009, , Page 423-429
Abstract
The producing composite materials of dual reinforcement in which the matrix material is aluminum reinforced with two types of ceramic particles : which are Alumina (50μmKeywordscomposite ... Read More ...Encrypting Audio Data Hiding by Visual Secret Sharing
Volume 27, Issue 13 , September 2009, , Page 2352-2364
Abstract
Steganography and cryptography are usually used to ensure informationsafety in today’s data communication. This paper makes use of audiosteganography technique and encrypted secret ... Read More ...Enhancing Embedded Data Security By Turns Cipher Block Chaining Mode Into Stream Cipher
Volume 27, Issue 13 , September 2009, , Page 2457-2473