Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Which Bit Is Better in Least Significant Bit?
(Articles)
Fatin E. M. Al-Obaidi
,
Ali Jassim Mohamed Ali
Journal of Information Security
Vol.6 No.3
,May 14, 2015
DOI:
10.4236/jis.2015.63017
6,332
Downloads
7,936
Views
Citations
Design and Implementation of Multilevel Access Control in Synchronized Audio to Audio Steganography Using Symmetric Polynomial Scheme
(Articles)
Jeddy Nafeesa Begum
,
Krishnan Kumar
,
Vembu Sumathy
Journal of Information Security
Vol.1 No.1
,July 30, 2010
DOI:
10.4236/jis.2010.11004
4,781
Downloads
9,488
Views
Citations
A Secure Transfer of Identification Information in Medical Images by Steganocryptography
(Articles)
Shuhong Jiao
,
Robert Goutte
Int'l J. of Communications, Network and System Sciences
Vol.3 No.10
,October 27, 2010
DOI:
10.4236/ijcns.2010.310107
6,656
Downloads
11,060
Views
Citations
A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysis
(Articles)
John Babu
,
Sridevi Rangu
,
Pradyusha Manogna
Journal of Information Security
Vol.8 No.3
,July 14, 2017
DOI:
10.4236/jis.2017.83013
2,045
Downloads
4,939
Views
Citations
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform
(Articles)
Ashraful Tauhid
,
Maisha Tasnim
,
Saima Arifin Noor
,
Nuruzzaman Faruqui
,
Mohammad Abu Yousuf
Journal of Information Security
Vol.10 No.3
,July 2, 2019
DOI:
10.4236/jis.2019.103007
1,204
Downloads
4,178
Views
Citations
This article belongs to the Special Issue on
Security and Cryptography
From Audio Branding to Sound Trademark: A Comparative Study in the EU and the US
(Articles)
Xinyu Zhang
Beijing Law Review
Vol.12 No.2
,April 26, 2021
DOI:
10.4236/blr.2021.122023
587
Downloads
3,029
Views
Citations
ContSteg: Contourlet-Based Steganography Method
(Articles)
Hedieh SAJEDI
,
Mansour JAMZAD
Wireless Sensor Network
Vol.1 No.3
,October 15, 2009
DOI:
10.4236/wsn.2009.13022
6,437
Downloads
11,982
Views
Citations
Hiding data in DNA of living organisms
(Articles)
Shu-Hong Jiao
,
Robert Goutte
Natural Science
Vol.1 No.3
,December 15, 2009
DOI:
10.4236/ns.2009.13023
6,157
Downloads
12,084
Views
Citations
A New Steganography Method Based on the Complex Pixels
(Articles)
Amin Hashemi Pour
,
Ali Payandeh
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33025
4,528
Downloads
8,230
Views
Citations
A Simple Steganography Algorithm Based on Lossless Compression Technique in WSN
(Articles)
R. Vijayarajeswari
,
A. Rajivkannan
,
J. Santhosh
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78117
1,990
Downloads
3,205
Views
Citations
Identity-Based Steganography in Spatial Domain
(Articles)
Xuba Xu
,
Qiankai Nie
Journal of Computer and Communications
Vol.6 No.3
,March 23, 2018
DOI:
10.4236/jcc.2018.63005
758
Downloads
1,723
Views
Citations
Countermeasure against Deepfake Using Steganography and Facial Detection
(Articles)
Kyle Corcoran
,
Jacob Ressler
,
Ye Zhu
Journal of Computer and Communications
Vol.9 No.9
,September 30, 2021
DOI:
10.4236/jcc.2021.99009
254
Downloads
1,617
Views
Citations
Review of Algorithms for Securing Data Transmission in Mobile Banking
(Articles)
Daniel Okari Orucho
,
Fredrick Mzee Awuor
,
Ratemo Makiya
,
Collins Oduor
Modern Economy
Vol.14 No.9
,September 15, 2023
DOI:
10.4236/me.2023.149062
111
Downloads
753
Views
Citations
MAP-based Audio Coding Compensation for Speaker Recognition
(Articles)
Tao Jiang
,
Jiqing Han
Journal of Signal and Information Processing
Vol.2 No.3
,August 12, 2011
DOI:
10.4236/jsip.2011.23021
5,955
Downloads
9,344
Views
Citations
ESL Learners’ Perceptions on English Subtitled Audio-Visual Materials
(Articles)
Farah Aina Anas
,
Nur Yasmin Khairani Zakaria
Creative Education
Vol.10 No.12
,November 28, 2019
DOI:
10.4236/ce.2019.1012206
835
Downloads
3,565
Views
Citations
This article belongs to the Special Issue on
Teaching and Learning
Enhancements in the Security Level for Wireless Sensor Network
(Articles)
Amr M. Kishk
,
Nagy W. Messiha
,
Nawal A. El-Fishawy
,
Abd-Elrahman A. Alkafs
,
Ahmed H. Madian
Journal of Information Security
Vol.6 No.3
,June 30, 2015
DOI:
10.4236/jis.2015.63022
4,546
Downloads
5,544
Views
Citations
How Do Patients Prefer to Receive Patient Education Material about Treatment, Diagnosis and Procedures?
—A Survey Study of Patients Preferences Regarding Forms of Patient Education Materials; Leaflets, Podcasts, and Video
(Articles)
Anna Krontoft
Open Journal of Nursing
Vol.11 No.10
,October 9, 2021
DOI:
10.4236/ojn.2021.1110068
347
Downloads
2,708
Views
Citations
This article belongs to the Special Issue on
Social Media, Communication and Technology in Nursing
Quantum Steganography Embedded Any Secret Text without Changing the Content of Cover Data
(Articles)
Takashi Mihara
Journal of Quantum Information Science
Vol.2 No.1
,March 28, 2012
DOI:
10.4236/jqis.2012.21003
5,815
Downloads
11,318
Views
Citations
A Robust Method to Detect Hidden Data from Digital Images
(Articles)
Romany F. Mansour
,
W. F. Awwad
,
A. A. Mohammed
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32011
12,121
Downloads
20,718
Views
Citations
A Secure Robust Gray Scale Image Steganography Using Image Segmentation
(Articles)
Mohammed J. Bawaneh
,
Atef A. Obeidat
Journal of Information Security
Vol.7 No.3
,April 11, 2016
DOI:
10.4236/jis.2016.73011
3,822
Downloads
6,495
Views
Citations
<
1
2
3
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top