[PDF][PDF] An enhanced JPEG steganography scheme with encryption technique

P Gope, A Kumar, G Luthra - International Journal of Computer and …, 2010 - ijcee.org
In the aspect of information security, steganolysis has been an important topic since first
indicated steganography has been used for communication. Apart from cryptography …

Steganography detection by means of neural networks

Z Oplatkova, J Holoska, I Zelinka… - 2008 19th International …, 2008 - ieeexplore.ieee.org
Cryptography is one of very much spoken word nowadays. Security of messages transfer is
very important and specialists have a work to think a new cryptography up. Cryptography, on …

[PDF][PDF] Information security through digital image steganography using multilevel and compression technique

B Mishra, R Beg, VP Singh - MIT International Journal of Computer …, 2013 - academia.edu
Digital communication has become an essential part of infrastructure nowadays, a lot of
applications are Internet-based and it is important that communication be made secret. The …

Security in digital images: From information hiding perspective

MA Otair - Handbook of Research on Threat Detection and …, 2015 - igi-global.com
Due to the swift growth of the using of the digital multimedia in the internet these days, the
security in digital images has become a very important issue. Lately, significant attentions …

Steganography detection using neural networks

TR Benala, S Dehuri, A Pagadala… - International …, 2011 - papers.ssrn.com
Cryptography though hides plain text messages by rendering the message unintelligible to
outsiders by various transformations of the text, but it can easily and often be used by …

Evaluating Organization External Knowledge Acquisition Based on Scenario

K Gao, Z Bao, X Li, L Guo… - … International Workshop on …, 2008 - ieeexplore.ieee.org
Knowledge can be acquired from organization inside and exterior. The knowledge inside
organization is limited and the organization external knowledge is important to advance …