Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Which Bit Is Better in Least Significant Bit?
(Articles)
Fatin E. M. Al-Obaidi
,
Ali Jassim Mohamed Ali
Journal of Information Security
Vol.6 No.3
,May 14, 2015
DOI:
10.4236/jis.2015.63017
6,335
Downloads
7,365
Views
Citations
Design and Implementation of Multilevel Access Control in Synchronized Audio to Audio Steganography Using Symmetric Polynomial Scheme
(Articles)
Jeddy Nafeesa Begum
,
Krishnan Kumar
,
Vembu Sumathy
Journal of Information Security
Vol.1 No.1
,July 30, 2010
DOI:
10.4236/jis.2010.11004
4,782
Downloads
9,328
Views
Citations
A Secure Transfer of Identification Information in Medical Images by Steganocryptography
(Articles)
Shuhong Jiao
,
Robert Goutte
Int'l J. of Communications, Network and System Sciences
Vol.3 No.10
,October 27, 2010
DOI:
10.4236/ijcns.2010.310107
6,662
Downloads
10,975
Views
Citations
A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysis
(Articles)
John Babu
,
Sridevi Rangu
,
Pradyusha Manogna
Journal of Information Security
Vol.8 No.3
,July 14, 2017
DOI:
10.4236/jis.2017.83013
2,050
Downloads
4,613
Views
Citations
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform
(Articles)
Ashraful Tauhid
,
Maisha Tasnim
,
Saima Arifin Noor
,
Nuruzzaman Faruqui
,
Mohammad Abu Yousuf
Journal of Information Security
Vol.10 No.3
,July 2, 2019
DOI:
10.4236/jis.2019.103007
1,215
Downloads
3,847
Views
Citations
This article belongs to the Special Issue on
Security and Cryptography
From Audio Branding to Sound Trademark: A Comparative Study in the EU and the US
(Articles)
Xinyu Zhang
Beijing Law Review
Vol.12 No.2
,April 26, 2021
DOI:
10.4236/blr.2021.122023
590
Downloads
2,789
Views
Citations
ContSteg: Contourlet-Based Steganography Method
(Articles)
Hedieh SAJEDI
,
Mansour JAMZAD
Wireless Sensor Network
Vol.1 No.3
,October 15, 2009
DOI:
10.4236/wsn.2009.13022
6,441
Downloads
11,887
Views
Citations
Hiding data in DNA of living organisms
(Articles)
Shu-Hong Jiao
,
Robert Goutte
Natural Science
Vol.1 No.3
,December 15, 2009
DOI:
10.4236/ns.2009.13023
6,161
Downloads
11,921
Views
Citations
A New Steganography Method Based on the Complex Pixels
(Articles)
Amin Hashemi Pour
,
Ali Payandeh
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33025
4,529
Downloads
8,126
Views
Citations
A Simple Steganography Algorithm Based on Lossless Compression Technique in WSN
(Articles)
R. Vijayarajeswari
,
A. Rajivkannan
,
J. Santhosh
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78117
1,990
Downloads
3,089
Views
Citations
Identity-Based Steganography in Spatial Domain
(Articles)
Xuba Xu
,
Qiankai Nie
Journal of Computer and Communications
Vol.6 No.3
,March 23, 2018
DOI:
10.4236/jcc.2018.63005
758
Downloads
1,578
Views
Citations
Countermeasure against Deepfake Using Steganography and Facial Detection
(Articles)
Kyle Corcoran
,
Jacob Ressler
,
Ye Zhu
Journal of Computer and Communications
Vol.9 No.9
,September 30, 2021
DOI:
10.4236/jcc.2021.99009
254
Downloads
1,539
Views
Citations
Review of Algorithms for Securing Data Transmission in Mobile Banking
(Articles)
Daniel Okari Orucho
,
Fredrick Mzee Awuor
,
Ratemo Makiya
,
Collins Oduor
Modern Economy
Vol.14 No.9
,September 15, 2023
DOI:
10.4236/me.2023.149062
113
Downloads
707
Views
Citations
MAP-based Audio Coding Compensation for Speaker Recognition
(Articles)
Tao Jiang
,
Jiqing Han
Journal of Signal and Information Processing
Vol.2 No.3
,August 12, 2011
DOI:
10.4236/jsip.2011.23021
5,958
Downloads
9,283
Views
Citations
ESL Learners’ Perceptions on English Subtitled Audio-Visual Materials
(Articles)
Farah Aina Anas
,
Nur Yasmin Khairani Zakaria
Creative Education
Vol.10 No.12
,November 28, 2019
DOI:
10.4236/ce.2019.1012206
836
Downloads
3,245
Views
Citations
This article belongs to the Special Issue on
Teaching and Learning
Enhancements in the Security Level for Wireless Sensor Network
(Articles)
Amr M. Kishk
,
Nagy W. Messiha
,
Nawal A. El-Fishawy
,
Abd-Elrahman A. Alkafs
,
Ahmed H. Madian
Journal of Information Security
Vol.6 No.3
,June 30, 2015
DOI:
10.4236/jis.2015.63022
4,546
Downloads
5,474
Views
Citations
How Do Patients Prefer to Receive Patient Education Material about Treatment, Diagnosis and Procedures?
—A Survey Study of Patients Preferences Regarding Forms of Patient Education Materials; Leaflets, Podcasts, and Video
(Articles)
Anna Krontoft
Open Journal of Nursing
Vol.11 No.10
,October 9, 2021
DOI:
10.4236/ojn.2021.1110068
348
Downloads
2,604
Views
Citations
This article belongs to the Special Issue on
Social Media, Communication and Technology in Nursing
Quantum Steganography Embedded Any Secret Text without Changing the Content of Cover Data
(Articles)
Takashi Mihara
Journal of Quantum Information Science
Vol.2 No.1
,March 28, 2012
DOI:
10.4236/jqis.2012.21003
5,821
Downloads
11,135
Views
Citations
A Robust Method to Detect Hidden Data from Digital Images
(Articles)
Romany F. Mansour
,
W. F. Awwad
,
A. A. Mohammed
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32011
12,135
Downloads
18,878
Views
Citations
A Secure Robust Gray Scale Image Steganography Using Image Segmentation
(Articles)
Mohammed J. Bawaneh
,
Atef A. Obeidat
Journal of Information Security
Vol.7 No.3
,April 11, 2016
DOI:
10.4236/jis.2016.73011
3,823
Downloads
6,166
Views
Citations
<
1
2
3
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top