Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,495,918 papers from all fields of science
Search
Sign In
Create Free Account
Steganography
Known as:
Steganograpy
, Steganographs
, File Camouflage
Expand
Steganography (US /ˌstɛ.ɡəˈnɔː.ɡrə.fi/, UK /ˌstɛɡ.əˈnɒɡ.rə.fi/) is the practice of concealing a file, message, image, or video within another file…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Anti-computer forensics
Bacon's cipher
Binary file
Blogosphere
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Analysis of Different Text Steganography Techniques: A Survey
Shivani Sharma
,
A. Gupta
,
M. Trivedi
,
Virendra Kumar Yadav
Conference Information and Communication…
2016
Corpus ID: 15884221
Steganography is helping individual to send confidential data between two parties. It enables user to hide data in different…
Expand
2015
2015
A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients
Yi Zhang
,
Xiangyang Luo
,
Chunfang Yang
,
Dengpan Ye
,
Fenlin Liu
ARES
2015
Corpus ID: 15377535
Current typical adaptive Steganography algorithms cannot extract the embedded secret messages correctly after compression. In…
Expand
Highly Cited
2013
Highly Cited
2013
A Multi-Source Steganography for Stereo Audio
Wu Yue
2013
Corpus ID: 62948706
We proposed a steganography algorithm for stereo multi-source audio by studying sound source separation technique based on…
Expand
Highly Cited
2010
Highly Cited
2010
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures
Erhan J. Kartaltepe
,
J. Morales
,
Shouhuai Xu
,
R. Sandhu
International Conference on Applied Cryptography…
2010
Corpus ID: 2451437
Botnets have become a major threat in cyberspace. In order to effectively combat botnets, we need to understand a botnet's…
Expand
Highly Cited
2010
Highly Cited
2010
A high payload frequency-based reversible image hiding method
Chinchen Chang
,
Pei-Yan Pai
,
Chia-Ming Yeh
,
Y. Chan
Information Sciences
2010
Corpus ID: 10730026
2008
2008
Spiking neural network and wavelets for hiding iris data in digital images
A. Hassanien
,
A. Abraham
,
C. Grosan
Soft Computing - A Fusion of Foundations…
2008
Corpus ID: 16137844
This paper introduces an efficient approach to protect the ownership by hiding the iris data into a digital image for…
Expand
Highly Cited
2005
Highly Cited
2005
(IEE Proceedings Vision, Image and Signal Processing, 152(5):611-615)Image Steganographic Scheme Based on Pixel-Value Differencing and LSB Replacement
H. C. Wu
,
N. Wu
,
C. Tsai
,
M. Hwang
2005
Corpus ID: 124934318
Highly Cited
2002
Highly Cited
2002
Sharing multiple secrets in digital images
Chwei-Shyong Tsai
,
Chinchen Chang
,
Tung-Shou Chen
Journal of Systems and Software
2002
Corpus ID: 5729158
Highly Cited
2001
Highly Cited
2001
Detecting Steganographic Messages in Digital Images
H. Farid
2001
Corpus ID: 18732995
Techniques and applications for information hiding have become increasingly more sophisticated and widespread. With high…
Expand
Highly Cited
2000
Highly Cited
2000
Spatial-domain image hiding using image differencing
Da-Chun Wu
,
Wen-Hsiang Tsai
2000
Corpus ID: 16464004
A method to embed a secret image into a cover image is proposed. The method is based on the similarity among the grey values of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE