Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Secure Transfer of Identification Information in Medical Images by Steganocryptography
(Articles)
Shuhong Jiao
,
Robert Goutte
Int'l J. of Communications, Network and System Sciences
Vol.3 No.10
,October 27, 2010
DOI:
10.4236/ijcns.2010.310107
6,648
Downloads
11,032
Views
Citations
A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysis
(Articles)
John Babu
,
Sridevi Rangu
,
Pradyusha Manogna
Journal of Information Security
Vol.8 No.3
,July 14, 2017
DOI:
10.4236/jis.2017.83013
2,032
Downloads
4,894
Views
Citations
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform
(Articles)
Ashraful Tauhid
,
Maisha Tasnim
,
Saima Arifin Noor
,
Nuruzzaman Faruqui
,
Mohammad Abu Yousuf
Journal of Information Security
Vol.10 No.3
,July 2, 2019
DOI:
10.4236/jis.2019.103007
1,194
Downloads
4,111
Views
Citations
This article belongs to the Special Issue on
Security and Cryptography
ContSteg: Contourlet-Based Steganography Method
(Articles)
Hedieh SAJEDI
,
Mansour JAMZAD
Wireless Sensor Network
Vol.1 No.3
,October 15, 2009
DOI:
10.4236/wsn.2009.13022
6,429
Downloads
11,957
Views
Citations
Hiding data in DNA of living organisms
(Articles)
Shu-Hong Jiao
,
Robert Goutte
Natural Science
Vol.1 No.3
,December 15, 2009
DOI:
10.4236/ns.2009.13023
6,145
Downloads
12,049
Views
Citations
A New Steganography Method Based on the Complex Pixels
(Articles)
Amin Hashemi Pour
,
Ali Payandeh
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33025
4,521
Downloads
8,204
Views
Citations
Which Bit Is Better in Least Significant Bit?
(Articles)
Fatin E. M. Al-Obaidi
,
Ali Jassim Mohamed Ali
Journal of Information Security
Vol.6 No.3
,May 14, 2015
DOI:
10.4236/jis.2015.63017
6,317
Downloads
7,891
Views
Citations
A Simple Steganography Algorithm Based on Lossless Compression Technique in WSN
(Articles)
R. Vijayarajeswari
,
A. Rajivkannan
,
J. Santhosh
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78117
1,980
Downloads
3,177
Views
Citations
Identity-Based Steganography in Spatial Domain
(Articles)
Xuba Xu
,
Qiankai Nie
Journal of Computer and Communications
Vol.6 No.3
,March 23, 2018
DOI:
10.4236/jcc.2018.63005
753
Downloads
1,704
Views
Citations
Countermeasure against Deepfake Using Steganography and Facial Detection
(Articles)
Kyle Corcoran
,
Jacob Ressler
,
Ye Zhu
Journal of Computer and Communications
Vol.9 No.9
,September 30, 2021
DOI:
10.4236/jcc.2021.99009
244
Downloads
1,557
Views
Citations
Review of Algorithms for Securing Data Transmission in Mobile Banking
(Articles)
Daniel Okari Orucho
,
Fredrick Mzee Awuor
,
Ratemo Makiya
,
Collins Oduor
Modern Economy
Vol.14 No.9
,September 15, 2023
DOI:
10.4236/me.2023.149062
99
Downloads
664
Views
Citations
Design and Implementation of Multilevel Access Control in Synchronized Audio to Audio Steganography Using Symmetric Polynomial Scheme
(Articles)
Jeddy Nafeesa Begum
,
Krishnan Kumar
,
Vembu Sumathy
Journal of Information Security
Vol.1 No.1
,July 30, 2010
DOI:
10.4236/jis.2010.11004
4,762
Downloads
9,451
Views
Citations
Quantum Steganography Embedded Any Secret Text without Changing the Content of Cover Data
(Articles)
Takashi Mihara
Journal of Quantum Information Science
Vol.2 No.1
,March 28, 2012
DOI:
10.4236/jqis.2012.21003
5,797
Downloads
11,277
Views
Citations
A Robust Method to Detect Hidden Data from Digital Images
(Articles)
Romany F. Mansour
,
W. F. Awwad
,
A. A. Mohammed
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32011
12,067
Downloads
20,575
Views
Citations
A Secure Robust Gray Scale Image Steganography Using Image Segmentation
(Articles)
Mohammed J. Bawaneh
,
Atef A. Obeidat
Journal of Information Security
Vol.7 No.3
,April 11, 2016
DOI:
10.4236/jis.2016.73011
3,817
Downloads
6,427
Views
Citations
Enhancing Mobile Cloud Computing Security Using Steganography
(Articles)
Hassan Reza
,
Madhuri Sonawane
Journal of Information Security
Vol.7 No.4
,July 19, 2016
DOI:
10.4236/jis.2016.74020
3,518
Downloads
6,570
Views
Citations
Block-Based Steganographic Algorithm Using Modulus Function and Pixel-Value Differencing
(Articles)
Ahlam K. Al-Dhamari
,
Khalid A. Darabkh
Journal of Software Engineering and Applications
Vol.10 No.1
,January 24, 2017
DOI:
10.4236/jsea.2017.101004
1,959
Downloads
3,641
Views
Citations
Ambiguous Multi-Symmetric Scheme and Applications
(Articles)
Richard Bassous
,
Ahmad Mansour
,
Roger Bassous
,
Huirong Fu
,
Ye Zhu
,
George Corser
Journal of Information Security
Vol.8 No.4
,October 31, 2017
DOI:
10.4236/jis.2017.84024
1,186
Downloads
2,588
Views
Citations
Use Two Hybrid SCA-AOA and Fuzzy SCA-AOA Algorithms in Information Security
(Articles)
Ayad Hamad Khalaf
,
Ban Ahmed Mitras
Open Access Library Journal
Vol.8 No.4
,April 30, 2021
DOI:
10.4236/oalib.1107339
132
Downloads
644
Views
Citations
Comparing the Accuracy of Network Utilization Performance between Real Network and Simulation Model for Local Area Network (LAN)
(Articles)
Mohd Nazri ISMAIL
,
Abdullah Mohd ZIN
Int'l J. of Communications, Network and System Sciences
Vol.1 No.4
,October 18, 2008
DOI:
10.4236/ijcns.2008.14042
9,663
Downloads
14,706
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top