Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,376,792 papers from all fields of science
Search
Sign In
Create Free Account
Steganography
Known as:
Steganograpy
, Steganographs
, File Camouflage
Expand
Steganography (US /ˌstɛ.ɡəˈnɔː.ɡrə.fi/, UK /ˌstɛɡ.əˈnɒɡ.rə.fi/) is the practice of concealing a file, message, image, or video within another file…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Anti-computer forensics
Bacon's cipher
Binary file
Blogosphere
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Digital image steganography using universal distortion
Vojtech Holub
,
J. Fridrich
Information Hiding and Multimedia Security…
2013
Corpus ID: 7050951
Currently, the most secure practical steganographic schemes for empirical cover sources embed their payload while minimizing a…
Expand
Review
2011
Review
2011
INFORMATION HIDING USING AUDIO STEGANOGRAPHY - A SURVEY
Jayaram
,
Raṅganātha
,
Anupama
2011
Corpus ID: 62315810
Today’s large demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public…
Expand
Highly Cited
2008
Highly Cited
2008
Detection of Double-Compression in JPEG Images for Applications in Steganography
T. Pevný
,
J. Fridrich
IEEE Transactions on Information Forensics and…
2008
Corpus ID: 11804151
This paper presents a method for the detection of double JPEG compression and a maximum-likelihood estimator of the primary…
Expand
Highly Cited
2007
Highly Cited
2007
A Novel Arabic Text Steganography Method Using Letter Points and Extensions
A. Gutub
,
Manal Mohammad Fattani
2007
Corpus ID: 2382871
This paper presents a new steganography approach suitable for Arabic texts. It can be classified under steganography feature…
Expand
Highly Cited
2007
Highly Cited
2007
Arabic Diacritics based Steganography
Mohammed A. Aabed
,
Sameh Awaideh
,
Abdul-Rahman M. Elshafei
,
A. Gutub
IEEE International Conference on Signal…
2007
Corpus ID: 13889745
New steganography methods are being proposed to embed secret information into text cover media in order to search for new…
Expand
Highly Cited
2006
Highly Cited
2006
A New Approach to Persian/Arabic Text Steganography
M. Shirali-Shahreza
,
M. Shirali-Shahreza
5th IEEE/ACIS International Conference on…
2006
Corpus ID: 917232
Conveying information secretly and establishing hidden relationship has been of interest since long past. Text documents have…
Expand
Highly Cited
2004
Highly Cited
2004
Improved Detection of LSB Steganography in Grayscale Images
Andrew D. Ker
Information Hiding
2004
Corpus ID: 6340948
We consider methods for answering reliably the question of whether an image contains hidden data; the focus is on grayscale…
Expand
Highly Cited
2003
Highly Cited
2003
Information hiding using steganography
M. Amin
,
S. Ibrahim
,
M. Salleh
,
Mohd Rozi
4th National Conference of Telecommunication…
2003
Corpus ID: 50035281
Due to advances in ICT, most information is kept electronically. Consequently, the security of information has become a…
Expand
Highly Cited
2001
Highly Cited
2001
An Implementation of Key-Based Digital Signal Steganography
T. Sharp
Information Hiding
2001
Corpus ID: 17958030
A real-life requirement motivated this case study of secure covert communication. An independently researched process is…
Expand
Highly Cited
1996
Highly Cited
1996
The History of Steganography
D. Kahn
Information Hiding
1996
Corpus ID: 206642054
The origin of steganography, it seems to me, is biological or physiological. Examples of what we call steganography today abound…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE